Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0040
Vulnerability from cvelistv5
Published
2009-02-22 22:00
Modified
2024-08-07 04:17
Severity ?
EPSS score ?
Summary
The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:0315", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "name": "SUSE-SA:2009:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3757" }, { "name": "SUSE-SA:2009:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "name": "GLSA-200903-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "name": "RHSA-2009:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3639" }, { "name": "35386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35386" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "DSA-1830", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1830" }, { "name": "ADV-2009-0632", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "RHSA-2009:0340", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "name": "1020521", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "ADV-2009-1560", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "name": "oval:org.mitre.oval:def:10316", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "name": "ADV-2009-0469", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "name": "34388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34388" }, { "name": "ADV-2009-1462", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "name": "SSA:2009-083-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "36096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36096" }, { "name": "[png-mng-implement] 20090219 libpng-1.2.35 and libpng-1.0.43 fix security vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "RHSA-2009:0325", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "name": "259989", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "name": "35302", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35302" }, { "name": "33976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33976" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "name": "libpng-pointer-arrays-code-execution(48819)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34140" }, { "name": "ADV-2009-1451", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "FEDORA-2009-2045", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "SUSE-SR:2009:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "name": "MDVSA-2009:083", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "name": "34464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34464" }, { "name": "34272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34272" }, { "name": "34210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34210" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" }, { "name": "APPLE-SA-2009-08-05-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:6458", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "name": "34265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34265" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "name": "34145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34145" }, { "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35379" }, { "name": "ADV-2009-0473", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "name": "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "name": "34143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34143" }, { "name": "FEDORA-2009-2882", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "name": "DSA-1750", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "name": "FEDORA-2009-2884", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" }, { "name": "SSA:2009-083-03", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952" }, { "name": "33970", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33970" }, { "name": "34137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34137" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441" }, { "name": "34462", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34462" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "FEDORA-2009-1976", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "name": "VU#649212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/649212" }, { "name": "34324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34324" }, { "name": "20090312 rPSA-2009-0046-1 libpng", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "name": "34152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34152" }, { "name": "MDVSA-2009:075", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "name": "33990", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33990" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "35258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35258" }, { "name": "33827", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33827" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "name": "ADV-2009-2172", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2172" }, { "name": "TA09-218A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "name": "MDVSA-2009:051", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "name": "34320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34320" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2009:0315", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "name": "SUSE-SA:2009:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3757" }, { "name": "SUSE-SA:2009:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "name": "GLSA-200903-28", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "name": "RHSA-2009:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3639" }, { "name": "35386", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35386" }, { "name": "GLSA-201209-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "DSA-1830", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1830" }, { "name": "ADV-2009-0632", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "name": "ADV-2009-1621", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "RHSA-2009:0340", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "name": "1020521", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "ADV-2009-1560", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "name": "oval:org.mitre.oval:def:10316", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "name": "ADV-2009-0469", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "name": "34388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34388" }, { "name": "ADV-2009-1462", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "name": "SSA:2009-083-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420" }, { "name": "APPLE-SA-2009-06-08-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "36096", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36096" }, { "name": "[png-mng-implement] 20090219 libpng-1.2.35 and libpng-1.0.43 fix security vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "RHSA-2009:0325", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "name": "259989", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "name": "35302", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35302" }, { "name": "33976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33976" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35074" }, { "name": "libpng-pointer-arrays-code-execution(48819)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "name": "ADV-2009-1522", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "34140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34140" }, { "name": "ADV-2009-1451", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "name": "APPLE-SA-2009-06-17-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "FEDORA-2009-2045", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "SUSE-SR:2009:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "name": "MDVSA-2009:083", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "name": "34464", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34464" }, { "name": "34272", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34272" }, { "name": "34210", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34210" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" }, { "name": "APPLE-SA-2009-08-05-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "name": "oval:org.mitre.oval:def:6458", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "name": "34265", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34265" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "name": "34145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34145" }, { "name": "20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "35379", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35379" }, { "name": "ADV-2009-0473", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "name": "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "name": "34143", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34143" }, { "name": "FEDORA-2009-2882", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "name": "DSA-1750", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "name": "FEDORA-2009-2884", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" }, { "name": "SSA:2009-083-03", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952" }, { "name": "33970", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33970" }, { "name": "34137", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34137" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441" }, { "name": "34462", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34462" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "FEDORA-2009-1976", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "name": "VU#649212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/649212" }, { "name": "34324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34324" }, { "name": "20090312 rPSA-2009-0046-1 libpng", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "name": "34152", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34152" }, { "name": "MDVSA-2009:075", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "name": "33990", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33990" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3613" }, { "name": "35258", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35258" }, { "name": "33827", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33827" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "name": "ADV-2009-2172", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2172" }, { "name": "TA09-218A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "name": "MDVSA-2009:051", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "name": "34320", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34320" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-0040", "datePublished": "2009-02-22T22:00:00", "dateReserved": "2008-12-15T00:00:00", "dateUpdated": "2024-08-07T04:17:10.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-0040\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-02-22T22:30:00.203\",\"lastModified\":\"2024-11-21T00:58:55.737\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.\"},{\"lang\":\"es\",\"value\":\"La libreria de referencia PNG (tambien conocida como libpng) anterior a v1.0.43, y v1.2.x anteriores a 1.2.35, utilizado en pngcrush y otras aplicaciones, lo que permite a atacantes dependientes de contexto producir una denegacion de servicio (caida de aplicacion) o posiblemente ejecutar codigo a traves de de un fichero PNG manipulado que inicia un puntero sin inicializar en (1) la funcion png_read_png, (2) manejador pCAL, o (3) instalacion de tablas de gamma de 16-bit.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-824\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.43\",\"matchCriteriaId\":\"AC1A6D90-D8E8-4F56-BA83-47E9E5B46549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.2.0\",\"versionEndExcluding\":\"1.2.35\",\"matchCriteriaId\":\"9789BC2F-6EB8-4357-90E8-0F372DA76170\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.0\",\"matchCriteriaId\":\"48C7B5CA-82E7-4676-BDBA-76C1098DDEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.5.8\",\"matchCriteriaId\":\"80C038E4-C24D-45E9-8287-C205C0C07809\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B68DF-1440-4587-8458-9C5F4D1E43F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3243C77-D635-480D-908C-328A479719E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"513797E6-FCE6-4E84-9B66-202541F9601E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"743CBBB1-C140-4FEF-B40E-FAE4511B1140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7000D33B-F3C7-43E8-8FC7-9B97AADC3E12\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Product\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000062.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/33970\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33976\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34137\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34140\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34143\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34145\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34152\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34210\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34265\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34272\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34320\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34324\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34388\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34462\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34464\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35258\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35302\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35386\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36096\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-28.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201209-25.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3757\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0046\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1750\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1830\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/649212\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:051\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:075\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:083\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0315.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0325.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0333.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0340.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/501767/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/503912/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/505990/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33827\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33990\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-218A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0469\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0473\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0632\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1451\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1462\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1560\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2172\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48819\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2009/000062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/33970\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34140\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34143\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34388\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/34464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35386\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200903-28.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201209-25.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3757\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1750\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/649212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0315.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0325.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0333.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0340.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/501767/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/503912/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/505990/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-218A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0469\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0473\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/0632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}" } }
ghsa-m968-rq7m-646j
Vulnerability from github
Published
2022-05-03 03:20
Modified
2022-05-03 03:20
Details
The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
{ "affected": [], "aliases": [ "CVE-2009-0040" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-02-22T22:30:00Z", "severity": "MODERATE" }, "details": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.", "id": "GHSA-m968-rq7m-646j", "modified": "2022-05-03T03:20:21Z", "published": "2022-05-03T03:20:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" }, { "type": "WEB", "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "type": "WEB", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/33970" }, { "type": "WEB", "url": "http://secunia.com/advisories/33976" }, { "type": "WEB", "url": "http://secunia.com/advisories/34137" }, { "type": "WEB", "url": "http://secunia.com/advisories/34140" }, { "type": "WEB", "url": "http://secunia.com/advisories/34143" }, { "type": "WEB", "url": "http://secunia.com/advisories/34145" }, { "type": "WEB", "url": "http://secunia.com/advisories/34152" }, { "type": "WEB", "url": "http://secunia.com/advisories/34210" }, { "type": "WEB", "url": "http://secunia.com/advisories/34265" }, { "type": "WEB", "url": "http://secunia.com/advisories/34272" }, { "type": "WEB", "url": "http://secunia.com/advisories/34320" }, { "type": "WEB", "url": "http://secunia.com/advisories/34324" }, { "type": "WEB", "url": "http://secunia.com/advisories/34388" }, { "type": "WEB", "url": "http://secunia.com/advisories/34462" }, { "type": "WEB", "url": "http://secunia.com/advisories/34464" }, { "type": "WEB", "url": "http://secunia.com/advisories/35074" }, { "type": "WEB", "url": "http://secunia.com/advisories/35258" }, { "type": "WEB", "url": "http://secunia.com/advisories/35302" }, { "type": "WEB", "url": "http://secunia.com/advisories/35379" }, { "type": "WEB", "url": "http://secunia.com/advisories/35386" }, { "type": "WEB", "url": "http://secunia.com/advisories/36096" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952" }, { "type": "WEB", "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "type": "WEB", "url": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3549" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3613" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3639" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3757" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "type": "WEB", "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document" }, { "type": "WEB", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1750" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1830" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/649212" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/33827" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/33990" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/2172" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2009-0040
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-0040", "description": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.", "id": "GSD-2009-0040", "references": [ "https://www.suse.com/security/cve/CVE-2009-0040.html", "https://www.debian.org/security/2009/dsa-1830", "https://www.debian.org/security/2009/dsa-1750", "https://access.redhat.com/errata/RHSA-2009:0340", "https://access.redhat.com/errata/RHSA-2009:0333", "https://access.redhat.com/errata/RHSA-2009:0325", "https://access.redhat.com/errata/RHSA-2009:0315", "https://linux.oracle.com/cve/CVE-2009-0040.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-0040" ], "details": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.", "id": "GSD-2009-0040", "modified": "2023-12-13T01:19:44.598717Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-0040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "name": "http://www.debian.org/security/2009/dsa-1830", "refsource": "MISC", "url": "http://www.debian.org/security/2009/dsa-1830" }, { "name": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "name": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "name": "http://secunia.com/advisories/35379", "refsource": "MISC", "url": "http://secunia.com/advisories/35379" }, { "name": "http://support.apple.com/kb/HT3613", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3613" }, { "name": "http://support.apple.com/kb/HT3639", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3639" }, { "name": "http://www.vupen.com/english/advisories/2009/1522", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "name": "http://www.vupen.com/english/advisories/2009/1621", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "name": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://secunia.com/advisories/35074", "refsource": "MISC", "url": "http://secunia.com/advisories/35074" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3549" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "http://www.vupen.com/english/advisories/2009/1297", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "http://secunia.com/advisories/34324", "refsource": "MISC", "url": "http://secunia.com/advisories/34324" }, { "name": "http://secunia.com/advisories/34462", "refsource": "MISC", "url": "http://secunia.com/advisories/34462" }, { "name": "http://secunia.com/advisories/34464", "refsource": "MISC", "url": "http://secunia.com/advisories/34464" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "name": "http://secunia.com/advisories/34137", "refsource": "MISC", "url": "http://secunia.com/advisories/34137" }, { "name": "http://secunia.com/advisories/34140", "refsource": "MISC", "url": "http://secunia.com/advisories/34140" }, { "name": "http://secunia.com/advisories/34145", "refsource": "MISC", "url": "http://secunia.com/advisories/34145" }, { "name": "http://secunia.com/advisories/34272", "refsource": "MISC", "url": "http://secunia.com/advisories/34272" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "name": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document", "refsource": "MISC", "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "name": "http://www.redhat.com/support/errata/RHSA-2009-0315.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2009-0325.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "name": "http://www.securityfocus.com/bid/33990", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/33990" }, { "name": "http://www.vupen.com/english/advisories/2009/0632", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "name": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html", "refsource": "MISC", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "name": "http://www.securityfocus.com/archive/1/505990/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "name": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "name": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt", "refsource": "MISC", "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" }, { "name": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt", "refsource": "MISC", "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "name": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "name": "http://secunia.com/advisories/33970", "refsource": "MISC", "url": "http://secunia.com/advisories/33970" }, { "name": "http://secunia.com/advisories/33976", "refsource": "MISC", "url": "http://secunia.com/advisories/33976" }, { "name": "http://secunia.com/advisories/34143", "refsource": "MISC", "url": "http://secunia.com/advisories/34143" }, { "name": "http://secunia.com/advisories/34152", "refsource": "MISC", "url": "http://secunia.com/advisories/34152" }, { "name": "http://secunia.com/advisories/34210", "refsource": "MISC", "url": "http://secunia.com/advisories/34210" }, { "name": "http://secunia.com/advisories/34265", "refsource": "MISC", "url": "http://secunia.com/advisories/34265" }, { "name": "http://secunia.com/advisories/34320", "refsource": "MISC", "url": "http://secunia.com/advisories/34320" }, { "name": "http://secunia.com/advisories/34388", "refsource": "MISC", "url": "http://secunia.com/advisories/34388" }, { "name": "http://secunia.com/advisories/35258", "refsource": "MISC", "url": "http://secunia.com/advisories/35258" }, { "name": "http://secunia.com/advisories/35302", "refsource": "MISC", "url": "http://secunia.com/advisories/35302" }, { "name": "http://secunia.com/advisories/35386", "refsource": "MISC", "url": "http://secunia.com/advisories/35386" }, { "name": "http://secunia.com/advisories/36096", "refsource": "MISC", "url": "http://secunia.com/advisories/36096" }, { "name": "http://security.gentoo.org/glsa/glsa-200903-28.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "name": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com", "refsource": "MISC", "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "name": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441", "refsource": "MISC", "url": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "name": "http://support.apple.com/kb/HT3757", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3757" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0046", "refsource": "MISC", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "name": "http://www.debian.org/security/2009/dsa-1750", "refsource": "MISC", "url": "http://www.debian.org/security/2009/dsa-1750" }, { "name": "http://www.kb.cert.org/vuls/id/649212", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/649212" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "name": "http://www.redhat.com/support/errata/RHSA-2009-0333.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2009-0340.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "name": "http://www.securityfocus.com/archive/1/501767/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "name": "http://www.securityfocus.com/archive/1/503912/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/33827", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/33827" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "name": "http://www.vupen.com/english/advisories/2009/0469", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "name": "http://www.vupen.com/english/advisories/2009/0473", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "name": "http://www.vupen.com/english/advisories/2009/1451", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "name": "http://www.vupen.com/english/advisories/2009/1462", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "name": "http://www.vupen.com/english/advisories/2009/1560", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "name": "http://www.vupen.com/english/advisories/2009/2172", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/2172" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC1A6D90-D8E8-4F56-BA83-47E9E5B46549", "versionEndExcluding": "1.0.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "matchCriteriaId": "9789BC2F-6EB8-4357-90E8-0F372DA76170", "versionEndExcluding": "1.2.35", "versionStartIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "48C7B5CA-82E7-4676-BDBA-76C1098DDEAB", "versionEndExcluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "80C038E4-C24D-45E9-8287-C205C0C07809", "versionEndExcluding": "10.5.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", "matchCriteriaId": "C3243C77-D635-480D-908C-328A479719E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "matchCriteriaId": "AED08A6F-CD23-4405-B1CF-C96BB8AE7D6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "matchCriteriaId": "743CBBB1-C140-4FEF-B40E-FAE4511B1140", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables." }, { "lang": "es", "value": "La libreria de referencia PNG (tambien conocida como libpng) anterior a v1.0.43, y v1.2.x anteriores a 1.2.35, utilizado en pngcrush y otras aplicaciones, lo que permite a atacantes dependientes de contexto producir una denegacion de servicio (caida de aplicacion) o posiblemente ejecutar codigo a traves de de un fichero PNG manipulado que inicia un puntero sin inicializar en (1) la funcion png_read_png, (2) manejador pCAL, o (3) instalacion de tablas de gamma de 16-bit." } ], "id": "CVE-2009-0040", "lastModified": "2024-02-09T03:25:43.877", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-22T22:30:00.203", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" }, { "source": "secalert@redhat.com", "tags": [ "Product" ], "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/33970" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "http://secunia.com/advisories/33976" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34137" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34140" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34143" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34145" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34152" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34210" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34265" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34272" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34320" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34324" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34388" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34462" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/34464" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35074" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35258" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35302" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35379" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35386" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/36096" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.405420" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.433952" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=1689\u0026release_id=662441" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3613" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3639" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3757" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362\u0026temp.productID=154235\u0026temp.releaseID=361845\u0026temp.bucketID=126655\u0026PAGE=Document" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://www.debian.org/security/2009/dsa-1830" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/649212" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/33827" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/33990" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/2172" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-824" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
RHSA-2009:0333
Vulnerability from csaf_redhat
Published
2009-03-04 19:58
Modified
2024-11-22 02:34
Summary
Red Hat Security Advisory: libpng security update
Notes
Topic
Updated libpng and libpng10 packages that fix a couple of security issues
are now available for Red Hat Enterprise Linux 2.1, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The libpng packages contain a library of functions for creating and
manipulating PNG (Portable Network Graphics) image format files.
A flaw was discovered in libpng that could result in libpng trying to
free() random memory if certain, unlikely error conditions occurred. If a
carefully-crafted PNG file was loaded by an application linked against
libpng, it could cause the application to crash or, potentially, execute
arbitrary code with the privileges of the user running the application.
(CVE-2009-0040)
A flaw was discovered in the way libpng handled PNG images containing
"unknown" chunks. If an application linked against libpng attempted to
process a malformed, unknown chunk in a malicious PNG image, it could cause
the application to crash. (CVE-2008-1382)
Users of libpng and libpng10 should upgrade to these updated packages,
which contain backported patches to correct these issues. All running
applications using libpng or libpng10 must be restarted for the update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libpng and libpng10 packages that fix a couple of security issues\nare now available for Red Hat Enterprise Linux 2.1, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The libpng packages contain a library of functions for creating and\nmanipulating PNG (Portable Network Graphics) image format files.\n\nA flaw was discovered in libpng that could result in libpng trying to\nfree() random memory if certain, unlikely error conditions occurred. If a\ncarefully-crafted PNG file was loaded by an application linked against\nlibpng, it could cause the application to crash or, potentially, execute\narbitrary code with the privileges of the user running the application.\n(CVE-2009-0040)\n\nA flaw was discovered in the way libpng handled PNG images containing\n\"unknown\" chunks. If an application linked against libpng attempted to\nprocess a malformed, unknown chunk in a malicious PNG image, it could cause\nthe application to crash. (CVE-2008-1382)\n\nUsers of libpng and libpng10 should upgrade to these updated packages,\nwhich contain backported patches to correct these issues. All running\napplications using libpng or libpng10 must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0333", "url": "https://access.redhat.com/errata/RHSA-2009:0333" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "441839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441839" }, { "category": "external", "summary": "486355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0333.json" } ], "title": "Red Hat Security Advisory: libpng security update", "tracking": { "current_release_date": "2024-11-22T02:34:04+00:00", "generator": { "date": "2024-11-22T02:34:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0333", "initial_release_date": "2009-03-04T19:58:00+00:00", "revision_history": [ { "date": "2009-03-04T19:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-04T15:05:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:34:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libpng-2:1.0.14-12.ia64", "product": { "name": "libpng-2:1.0.14-12.ia64", "product_id": "libpng-2:1.0.14-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.0.14-12?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.0.14-12.ia64", "product": { "name": "libpng-devel-2:1.0.14-12.ia64", "product_id": "libpng-devel-2:1.0.14-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.0.14-12?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.ia64", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.ia64", "product_id": "libpng-2:1.2.7-3.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.ia64", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.ia64", "product_id": "libpng10-0:1.0.16-3.el4_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=ia64" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=ia64" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=ia64" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=ia64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=ia64\u0026epoch=2" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libpng-2:1.0.14-12.src", "product": { "name": "libpng-2:1.0.14-12.src", "product_id": "libpng-2:1.0.14-12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.0.14-12?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.src", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.src", "product_id": "libpng-2:1.2.7-3.el4_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.src", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.src", "product_id": "libpng10-0:1.0.16-3.el4_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=src" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.src", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.src", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libpng-2:1.0.14-12.i386", "product": { "name": "libpng-2:1.0.14-12.i386", "product_id": "libpng-2:1.0.14-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.0.14-12?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.0.14-12.i386", "product": { "name": "libpng-devel-2:1.0.14-12.i386", "product_id": "libpng-devel-2:1.0.14-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.0.14-12?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.i386", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.i386", "product_id": "libpng-2:1.2.7-3.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.i386", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.i386", "product_id": "libpng10-0:1.0.16-3.el4_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=i386" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=i386" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=i386" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=i386\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.i386", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.i386", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=i386\u0026epoch=2" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.x86_64", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.x86_64", "product_id": "libpng-2:1.2.7-3.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "product_id": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=ppc64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.ppc64", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc64", "product_id": "libpng-2:1.2.7-3.el4_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=ppc64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "product_id": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=ppc64" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=ppc64" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=ppc64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=ppc64\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=ppc64\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=ppc\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.ppc", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc", "product_id": "libpng-2:1.2.7-3.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=ppc\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=ppc\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.ppc", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc", "product_id": "libpng10-0:1.0.16-3.el4_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=ppc" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=ppc" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=ppc" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=ppc\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=ppc\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=ppc\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.s390x", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.s390x", "product_id": "libpng-2:1.2.7-3.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.s390x", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390x", "product_id": "libpng10-0:1.0.16-3.el4_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=s390x" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=s390x" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=s390x" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "product": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "product_id": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.7-3.el4_7.2?arch=s390\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.7-3.el4_7.2.s390", "product": { "name": "libpng-2:1.2.7-3.el4_7.2.s390", "product_id": "libpng-2:1.2.7-3.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.7-3.el4_7.2?arch=s390\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "product": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "product_id": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.7-3.el4_7.2?arch=s390\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng10-0:1.0.16-3.el4_7.3.s390", "product": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390", "product_id": "libpng10-0:1.0.16-3.el4_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10@1.0.16-3.el4_7.3?arch=s390" } } }, { "category": "product_version", "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "product": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "product_id": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-debuginfo@1.0.16-3.el4_7.3?arch=s390" } } }, { "category": "product_version", "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "product": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "product_id": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng10-devel@1.0.16-3.el4_7.3?arch=s390" } } }, { "category": "product_version", "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "product": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "product_id": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-debuginfo@1.2.10-7.1.el5_3.2?arch=s390\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "product": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "product_id": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng-devel@1.2.10-7.1.el5_3.2?arch=s390\u0026epoch=2" } } }, { "category": "product_version", "name": "libpng-2:1.2.10-7.1.el5_3.2.s390", "product": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390", "product_id": "libpng-2:1.2.10-7.1.el5_3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libpng@1.2.10-7.1.el5_3.2?arch=s390\u0026epoch=2" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:libpng-2:1.0.14-12.i386" }, "product_reference": "libpng-2:1.0.14-12.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:libpng-2:1.0.14-12.ia64" }, "product_reference": "libpng-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:libpng-2:1.0.14-12.src" }, "product_reference": "libpng-2:1.0.14-12.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:libpng-devel-2:1.0.14-12.i386" }, "product_reference": "libpng-devel-2:1.0.14-12.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:libpng-devel-2:1.0.14-12.ia64" }, "product_reference": "libpng-devel-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:libpng-2:1.0.14-12.i386" }, "product_reference": "libpng-2:1.0.14-12.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:libpng-2:1.0.14-12.ia64" }, "product_reference": "libpng-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:libpng-2:1.0.14-12.src" }, "product_reference": "libpng-2:1.0.14-12.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:libpng-devel-2:1.0.14-12.i386" }, "product_reference": "libpng-devel-2:1.0.14-12.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:libpng-devel-2:1.0.14-12.ia64" }, "product_reference": "libpng-devel-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:libpng-2:1.0.14-12.i386" }, "product_reference": "libpng-2:1.0.14-12.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:libpng-2:1.0.14-12.ia64" }, "product_reference": "libpng-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:libpng-2:1.0.14-12.src" }, "product_reference": "libpng-2:1.0.14-12.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:libpng-devel-2:1.0.14-12.i386" }, "product_reference": "libpng-devel-2:1.0.14-12.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:libpng-devel-2:1.0.14-12.ia64" }, "product_reference": "libpng-devel-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:libpng-2:1.0.14-12.i386" }, "product_reference": "libpng-2:1.0.14-12.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:libpng-2:1.0.14-12.ia64" }, "product_reference": "libpng-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.0.14-12.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:libpng-2:1.0.14-12.src" }, "product_reference": "libpng-2:1.0.14-12.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:libpng-devel-2:1.0.14-12.i386" }, "product_reference": "libpng-devel-2:1.0.14-12.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.0.14-12.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:libpng-devel-2:1.0.14-12.ia64" }, "product_reference": "libpng-devel-2:1.0.14-12.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.src" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.src" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.src" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.src" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.src" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.src" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.src" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64" }, "product_reference": "libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.src" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.src" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" }, "product_reference": "libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-1382", "discovery_date": "2008-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "441839" } ], "notes": [ { "category": "description", "text": "libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length \"unknown\" chunks, which trigger an access of uninitialized memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "libpng unknown chunk handling flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of libpng as shipped with Red Hat Enterprise Linux 3.\n\nUpdates for affected versions of Red Hat Enterprise Linux can be found here:\nhttp://rhn.redhat.com/errata/RHSA-2009-0333.html", "title": "Statement" } ], "product_status": { "fixed": [ "2.1AS:libpng-2:1.0.14-12.i386", "2.1AS:libpng-2:1.0.14-12.ia64", "2.1AS:libpng-2:1.0.14-12.src", "2.1AS:libpng-devel-2:1.0.14-12.i386", "2.1AS:libpng-devel-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.i386", "2.1AW:libpng-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.src", "2.1AW:libpng-devel-2:1.0.14-12.i386", "2.1AW:libpng-devel-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.i386", "2.1ES:libpng-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.src", "2.1ES:libpng-devel-2:1.0.14-12.i386", "2.1ES:libpng-devel-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.i386", "2.1WS:libpng-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.src", "2.1WS:libpng-devel-2:1.0.14-12.i386", "2.1WS:libpng-devel-2:1.0.14-12.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-2:1.2.7-3.el4_7.2.src", "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng10-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-0:1.0.16-3.el4_7.3.src", "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-2:1.2.7-3.el4_7.2.src", "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-2:1.2.7-3.el4_7.2.src", "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng10-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-0:1.0.16-3.el4_7.3.src", "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-2:1.2.7-3.el4_7.2.src", "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng10-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-0:1.0.16-3.el4_7.3.src", "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-2:1.2.10-7.1.el5_3.2.src", "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1382" }, { "category": "external", "summary": "RHBZ#441839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441839" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1382", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1382" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1382", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1382" } ], "release_date": "2008-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-04T19:58:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:libpng-2:1.0.14-12.i386", "2.1AS:libpng-2:1.0.14-12.ia64", "2.1AS:libpng-2:1.0.14-12.src", "2.1AS:libpng-devel-2:1.0.14-12.i386", "2.1AS:libpng-devel-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.i386", "2.1AW:libpng-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.src", "2.1AW:libpng-devel-2:1.0.14-12.i386", "2.1AW:libpng-devel-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.i386", "2.1ES:libpng-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.src", "2.1ES:libpng-devel-2:1.0.14-12.i386", "2.1ES:libpng-devel-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.i386", "2.1WS:libpng-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.src", "2.1WS:libpng-devel-2:1.0.14-12.i386", "2.1WS:libpng-devel-2:1.0.14-12.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-2:1.2.7-3.el4_7.2.src", "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng10-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-0:1.0.16-3.el4_7.3.src", "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-2:1.2.7-3.el4_7.2.src", "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-2:1.2.7-3.el4_7.2.src", "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng10-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-0:1.0.16-3.el4_7.3.src", "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-2:1.2.7-3.el4_7.2.src", "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng10-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-0:1.0.16-3.el4_7.3.src", "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-2:1.2.10-7.1.el5_3.2.src", "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0333" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libpng unknown chunk handling flaw" }, { "cve": "CVE-2009-0040", "discovery_date": "2009-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "486355" } ], "notes": [ { "category": "description", "text": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.", "title": "Vulnerability description" }, { "category": "summary", "text": "libpng arbitrary free() flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "2.1AS:libpng-2:1.0.14-12.i386", "2.1AS:libpng-2:1.0.14-12.ia64", "2.1AS:libpng-2:1.0.14-12.src", "2.1AS:libpng-devel-2:1.0.14-12.i386", "2.1AS:libpng-devel-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.i386", "2.1AW:libpng-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.src", "2.1AW:libpng-devel-2:1.0.14-12.i386", "2.1AW:libpng-devel-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.i386", "2.1ES:libpng-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.src", "2.1ES:libpng-devel-2:1.0.14-12.i386", "2.1ES:libpng-devel-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.i386", "2.1WS:libpng-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.src", "2.1WS:libpng-devel-2:1.0.14-12.i386", "2.1WS:libpng-devel-2:1.0.14-12.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-2:1.2.7-3.el4_7.2.src", "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng10-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-0:1.0.16-3.el4_7.3.src", "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-2:1.2.7-3.el4_7.2.src", "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-2:1.2.7-3.el4_7.2.src", "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng10-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-0:1.0.16-3.el4_7.3.src", "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-2:1.2.7-3.el4_7.2.src", "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng10-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-0:1.0.16-3.el4_7.3.src", "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-2:1.2.10-7.1.el5_3.2.src", "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0040" }, { "category": "external", "summary": "RHBZ#486355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0040", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040" } ], "release_date": "2009-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-04T19:58:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "2.1AS:libpng-2:1.0.14-12.i386", "2.1AS:libpng-2:1.0.14-12.ia64", "2.1AS:libpng-2:1.0.14-12.src", "2.1AS:libpng-devel-2:1.0.14-12.i386", "2.1AS:libpng-devel-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.i386", "2.1AW:libpng-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.src", "2.1AW:libpng-devel-2:1.0.14-12.i386", "2.1AW:libpng-devel-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.i386", "2.1ES:libpng-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.src", "2.1ES:libpng-devel-2:1.0.14-12.i386", "2.1ES:libpng-devel-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.i386", "2.1WS:libpng-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.src", "2.1WS:libpng-devel-2:1.0.14-12.i386", "2.1WS:libpng-devel-2:1.0.14-12.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-2:1.2.7-3.el4_7.2.src", "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng10-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-0:1.0.16-3.el4_7.3.src", "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-2:1.2.7-3.el4_7.2.src", "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-2:1.2.7-3.el4_7.2.src", "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng10-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-0:1.0.16-3.el4_7.3.src", "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-2:1.2.7-3.el4_7.2.src", "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng10-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-0:1.0.16-3.el4_7.3.src", "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-2:1.2.10-7.1.el5_3.2.src", "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0333" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "2.1AS:libpng-2:1.0.14-12.i386", "2.1AS:libpng-2:1.0.14-12.ia64", "2.1AS:libpng-2:1.0.14-12.src", "2.1AS:libpng-devel-2:1.0.14-12.i386", "2.1AS:libpng-devel-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.i386", "2.1AW:libpng-2:1.0.14-12.ia64", "2.1AW:libpng-2:1.0.14-12.src", "2.1AW:libpng-devel-2:1.0.14-12.i386", "2.1AW:libpng-devel-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.i386", "2.1ES:libpng-2:1.0.14-12.ia64", "2.1ES:libpng-2:1.0.14-12.src", "2.1ES:libpng-devel-2:1.0.14-12.i386", "2.1ES:libpng-devel-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.i386", "2.1WS:libpng-2:1.0.14-12.ia64", "2.1WS:libpng-2:1.0.14-12.src", "2.1WS:libpng-devel-2:1.0.14-12.i386", "2.1WS:libpng-devel-2:1.0.14-12.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-2:1.2.7-3.el4_7.2.src", "4AS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4AS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4AS:libpng10-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-0:1.0.16-3.el4_7.3.src", "4AS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4AS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-2:1.2.7-3.el4_7.2.src", "4Desktop:libpng-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4Desktop:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.src", "4Desktop:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4Desktop:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-2:1.2.7-3.el4_7.2.src", "4ES:libpng-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4ES:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4ES:libpng10-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-0:1.0.16-3.el4_7.3.src", "4ES:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4ES:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-2:1.2.7-3.el4_7.2.src", "4WS:libpng-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.ppc64", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-debuginfo-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.i386", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ia64", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.ppc", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.s390x", "4WS:libpng-devel-2:1.2.7-3.el4_7.2.x86_64", "4WS:libpng10-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-0:1.0.16-3.el4_7.3.src", "4WS:libpng10-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.ppc64", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-debuginfo-0:1.0.16-3.el4_7.3.x86_64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.i386", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ia64", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.ppc", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.s390x", "4WS:libpng10-devel-0:1.0.16-3.el4_7.3.x86_64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client-Workstation:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client-Workstation:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-2:1.2.10-7.1.el5_3.2.src", "5Client:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Client:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-2:1.2.10-7.1.el5_3.2.src", "5Server:libpng-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-debuginfo-2:1.2.10-7.1.el5_3.2.x86_64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.i386", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ia64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.ppc64", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.s390x", "5Server:libpng-devel-2:1.2.10-7.1.el5_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libpng arbitrary free() flaw" } ] }
rhsa-2009:0315
Vulnerability from csaf_redhat
Published
2009-03-05 00:10
Modified
2024-11-22 02:33
Summary
Red Hat Security Advisory: firefox security update
Notes
Topic
An updated firefox package that fixes various security issues is now
available for Red Hat Enterprise Linux 4 and 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
Mozilla Firefox is an open source Web browser.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2009-0040, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774,
CVE-2009-0775)
Several flaws were found in the way malformed content was processed. A
website containing specially-crafted content could, potentially, trick a
Firefox user into surrendering sensitive information. (CVE-2009-0776,
CVE-2009-0777)
For technical details regarding these flaws, please see the Mozilla
security advisories for Firefox 3.0.7. You can find a link to the Mozilla
advisories in the References section of this errata.
All Firefox users should upgrade to these updated packages, which contain
Firefox version 3.0.7, and which correct these issues. After installing the
update, Firefox must be restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated firefox package that fixes various security issues is now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open source Web browser.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Firefox to crash or,\npotentially, execute arbitrary code as the user running Firefox.\n(CVE-2009-0040, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774,\nCVE-2009-0775)\n\nSeveral flaws were found in the way malformed content was processed. A\nwebsite containing specially-crafted content could, potentially, trick a\nFirefox user into surrendering sensitive information. (CVE-2009-0776,\nCVE-2009-0777)\n\nFor technical details regarding these flaws, please see the Mozilla\nsecurity advisories for Firefox 3.0.7. You can find a link to the Mozilla\nadvisories in the References section of this errata.\n\nAll Firefox users should upgrade to these updated packages, which contain\nFirefox version 3.0.7, and which correct these issues. After installing the\nupdate, Firefox must be restarted for the changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0315", "url": "https://access.redhat.com/errata/RHSA-2009:0315" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.7", "url": "http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.7" }, { "category": "external", "summary": "486355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "category": "external", "summary": "488272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488272" }, { "category": "external", "summary": "488273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488273" }, { "category": "external", "summary": "488276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488276" }, { "category": "external", "summary": "488283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488283" }, { "category": "external", "summary": "488287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488287" }, { "category": "external", "summary": "488290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488290" }, { "category": "external", "summary": "488292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488292" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0315.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T02:33:54+00:00", "generator": { "date": "2024-11-22T02:33:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0315", "initial_release_date": "2009-03-05T00:10:00+00:00", "revision_history": [ { "date": "2009-03-05T00:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-04T19:20:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:33:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.ia64", "product": { "name": "firefox-0:3.0.7-1.el4.ia64", "product_id": "firefox-0:3.0.7-1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=ia64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.ia64", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ia64", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=ia64" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.ia64", "product": { "name": "firefox-0:3.0.7-1.el5.ia64", "product_id": "firefox-0:3.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.ia64", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.ia64", "product_id": "xulrunner-0:1.9.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=ia64" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "product_id": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.7-1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.x86_64", "product": { "name": "firefox-0:3.0.7-1.el4.x86_64", "product_id": "firefox-0:3.0.7-1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.x86_64", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.x86_64", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.x86_64", "product": { "name": "firefox-0:3.0.7-1.el5.x86_64", "product_id": "firefox-0:3.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "product_id": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.7-1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.x86_64", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.x86_64", "product_id": "xulrunner-0:1.9.0.7-1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.i386", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.i386", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.i386", "product": { "name": "firefox-0:3.0.7-1.el4.i386", "product_id": "firefox-0:3.0.7-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=i386" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.i386", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.i386", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=i386" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.i386", "product": { "name": "firefox-0:3.0.7-1.el5.i386", "product_id": "firefox-0:3.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "product_id": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.7-1.el5?arch=i386" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.i386", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.i386", "product_id": "xulrunner-0:1.9.0.7-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.src", "product": { "name": "firefox-0:3.0.7-1.el4.src", "product_id": "firefox-0:3.0.7-1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=src" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.src", "product": { "name": "firefox-0:3.0.7-1.el5.src", "product_id": "firefox-0:3.0.7-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=src" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.src", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.src", "product_id": "xulrunner-0:1.9.0.7-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.ppc", "product": { "name": "firefox-0:3.0.7-1.el4.ppc", "product_id": "firefox-0:3.0.7-1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=ppc" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.ppc", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ppc", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=ppc" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.ppc", "product": { "name": "firefox-0:3.0.7-1.el5.ppc", "product_id": "firefox-0:3.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.ppc", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc", "product_id": "xulrunner-0:1.9.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=ppc" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "product_id": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.7-1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.s390x", "product": { "name": "firefox-0:3.0.7-1.el4.s390x", "product_id": "firefox-0:3.0.7-1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.s390x", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390x", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=s390x" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.s390x", "product": { "name": "firefox-0:3.0.7-1.el5.s390x", "product_id": "firefox-0:3.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.s390x", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.s390x", "product_id": "xulrunner-0:1.9.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=s390x" } } }, { "category": "product_version", "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "product": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "product_id": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel-unstable@1.9.0.7-1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el4.s390", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390", "product_id": "firefox-debuginfo-0:3.0.7-1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el4.s390", "product": { "name": "firefox-0:3.0.7-1.el4.s390", "product_id": "firefox-0:3.0.7-1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el4?arch=s390" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:3.0.7-1.el5.s390", "product": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390", "product_id": "firefox-debuginfo-0:3.0.7-1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@3.0.7-1.el5?arch=s390" } } }, { "category": "product_version", "name": "firefox-0:3.0.7-1.el5.s390", "product": { "name": "firefox-0:3.0.7-1.el5.s390", "product_id": "firefox-0:3.0.7-1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@3.0.7-1.el5?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.s390", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.s390", "product_id": "xulrunner-0:1.9.0.7-1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=s390" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "xulrunner-0:1.9.0.7-1.el5.ppc64", "product": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc64", "product_id": "xulrunner-0:1.9.0.7-1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner@1.9.0.7-1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "product": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "product_id": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-devel@1.9.0.7-1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "product": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "product_id": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xulrunner-debuginfo@1.9.0.7-1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.src" }, "product_reference": "firefox-0:3.0.7-1.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.src" }, "product_reference": "firefox-0:3.0.7-1.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.src" }, "product_reference": "firefox-0:3.0.7-1.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.src" }, "product_reference": "firefox-0:3.0.7-1.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.i386" }, "product_reference": "firefox-0:3.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.ia64" }, "product_reference": "firefox-0:3.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.ppc" }, "product_reference": "firefox-0:3.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.s390" }, "product_reference": "firefox-0:3.0.7-1.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.s390x" }, "product_reference": "firefox-0:3.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.src" }, "product_reference": "firefox-0:3.0.7-1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-0:3.0.7-1.el5.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.src" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.i386" }, "product_reference": "firefox-0:3.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.ia64" }, "product_reference": "firefox-0:3.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.ppc" }, "product_reference": "firefox-0:3.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.s390" }, "product_reference": "firefox-0:3.0.7-1.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.s390x" }, "product_reference": "firefox-0:3.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.src" }, "product_reference": "firefox-0:3.0.7-1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:3.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-0:3.0.7-1.el5.x86_64" }, "product_reference": "firefox-0:3.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:3.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64" }, "product_reference": "firefox-debuginfo-0:3.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.src" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" }, "product_reference": "xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0040", "discovery_date": "2009-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "486355" } ], "notes": [ { "category": "description", "text": "The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.", "title": "Vulnerability description" }, { "category": "summary", "text": "libpng arbitrary free() flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0040" }, { "category": "external", "summary": "RHBZ#486355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0040", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040" } ], "release_date": "2009-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libpng arbitrary free() flaw" }, { "cve": "CVE-2009-0771", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488272" } ], "notes": [ { "category": "description", "text": "The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3 Layout Engine Crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0771" }, { "category": "external", "summary": "RHBZ#488272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488272" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0771", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0771" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3 Layout Engine Crashes" }, { "cve": "CVE-2009-0772", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488273" } ], "notes": [ { "category": "description", "text": "The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 2 and 3 - Layout engine crashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0772" }, { "category": "external", "summary": "RHBZ#488273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0772", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0772" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 2 and 3 - Layout engine crashes" }, { "cve": "CVE-2009-0773", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488276" } ], "notes": [ { "category": "description", "text": "The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains \"some non-set elements,\" which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 3 crashes in the JavaScript engine", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0773" }, { "category": "external", "summary": "RHBZ#488276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488276" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0773", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0773" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 3 crashes in the JavaScript engine" }, { "cve": "CVE-2009-0774", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488283" } ], "notes": [ { "category": "description", "text": "The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox 2 and 3 crashes in the JavaScript engine", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0774" }, { "category": "external", "summary": "RHBZ#488283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0774", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0774" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox 2 and 3 crashes in the JavaScript engine" }, { "cve": "CVE-2009-0775", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488287" } ], "notes": [ { "category": "description", "text": "Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via \"cloned XUL DOM elements which were linked as a parent and child,\" which are not properly handled during garbage collection.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox XUL Linked Clones Double Free Vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0775" }, { "category": "external", "summary": "RHBZ#488287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488287" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0775", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0775" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Firefox XUL Linked Clones Double Free Vulnerability" }, { "cve": "CVE-2009-0776", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488290" } ], "notes": [ { "category": "description", "text": "nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox XML data theft via RDFXMLDataSource and cross-domain redirect", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0776" }, { "category": "external", "summary": "RHBZ#488290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0776", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0776" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Firefox XML data theft via RDFXMLDataSource and cross-domain redirect" }, { "cve": "CVE-2009-0777", "discovery_date": "2009-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "488292" } ], "notes": [ { "category": "description", "text": "Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Firefox URL spoofing with invisible control characters", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0777" }, { "category": "external", "summary": "RHBZ#488292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0777", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0777" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0777", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0777" } ], "release_date": "2009-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-05T00:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0315" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:firefox-0:3.0.7-1.el4.i386", "4AS:firefox-0:3.0.7-1.el4.ia64", "4AS:firefox-0:3.0.7-1.el4.ppc", "4AS:firefox-0:3.0.7-1.el4.s390", "4AS:firefox-0:3.0.7-1.el4.s390x", "4AS:firefox-0:3.0.7-1.el4.src", "4AS:firefox-0:3.0.7-1.el4.x86_64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4AS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4AS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4AS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-0:3.0.7-1.el4.i386", "4Desktop:firefox-0:3.0.7-1.el4.ia64", "4Desktop:firefox-0:3.0.7-1.el4.ppc", "4Desktop:firefox-0:3.0.7-1.el4.s390", "4Desktop:firefox-0:3.0.7-1.el4.s390x", "4Desktop:firefox-0:3.0.7-1.el4.src", "4Desktop:firefox-0:3.0.7-1.el4.x86_64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.i386", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4Desktop:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4ES:firefox-0:3.0.7-1.el4.i386", "4ES:firefox-0:3.0.7-1.el4.ia64", "4ES:firefox-0:3.0.7-1.el4.ppc", "4ES:firefox-0:3.0.7-1.el4.s390", "4ES:firefox-0:3.0.7-1.el4.s390x", "4ES:firefox-0:3.0.7-1.el4.src", "4ES:firefox-0:3.0.7-1.el4.x86_64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.i386", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4ES:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390", "4ES:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4ES:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "4WS:firefox-0:3.0.7-1.el4.i386", "4WS:firefox-0:3.0.7-1.el4.ia64", "4WS:firefox-0:3.0.7-1.el4.ppc", "4WS:firefox-0:3.0.7-1.el4.s390", "4WS:firefox-0:3.0.7-1.el4.s390x", "4WS:firefox-0:3.0.7-1.el4.src", "4WS:firefox-0:3.0.7-1.el4.x86_64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.i386", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ia64", "4WS:firefox-debuginfo-0:3.0.7-1.el4.ppc", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390", "4WS:firefox-debuginfo-0:3.0.7-1.el4.s390x", "4WS:firefox-debuginfo-0:3.0.7-1.el4.x86_64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.src", "5Client-Workstation:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client-Workstation:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Client:firefox-0:3.0.7-1.el5.i386", "5Client:firefox-0:3.0.7-1.el5.ia64", "5Client:firefox-0:3.0.7-1.el5.ppc", "5Client:firefox-0:3.0.7-1.el5.s390", "5Client:firefox-0:3.0.7-1.el5.s390x", "5Client:firefox-0:3.0.7-1.el5.src", "5Client:firefox-0:3.0.7-1.el5.x86_64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Client:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Client:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Client:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Client:xulrunner-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-0:1.9.0.7-1.el5.src", "5Client:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Client:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64", "5Server:firefox-0:3.0.7-1.el5.i386", "5Server:firefox-0:3.0.7-1.el5.ia64", "5Server:firefox-0:3.0.7-1.el5.ppc", "5Server:firefox-0:3.0.7-1.el5.s390", "5Server:firefox-0:3.0.7-1.el5.s390x", "5Server:firefox-0:3.0.7-1.el5.src", "5Server:firefox-0:3.0.7-1.el5.x86_64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.i386", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ia64", "5Server:firefox-debuginfo-0:3.0.7-1.el5.ppc", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390", "5Server:firefox-debuginfo-0:3.0.7-1.el5.s390x", "5Server:firefox-debuginfo-0:3.0.7-1.el5.x86_64", "5Server:xulrunner-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-0:1.9.0.7-1.el5.src", "5Server:xulrunner-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-debuginfo-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.ppc64", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-0:1.9.0.7-1.el5.x86_64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.i386", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ia64", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.ppc", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.s390x", "5Server:xulrunner-devel-unstable-0:1.9.0.7-1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Firefox URL spoofing with invisible control characters" } ] }
rhsa-2009:0325
Vulnerability from csaf_redhat
Published
2009-03-05 00:48
Modified
2024-11-22 02:33
Summary
Red Hat Security Advisory: seamonkey security update
Notes
Topic
Updated seamonkey packages that fix security issues are now available for
Red Hat Enterprise Linux 2.1, 3, and 4.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
SeaMonkey is an open source Web browser, email and newsgroup client, IRC
chat client, and HTML editor.
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause SeaMonkey to crash or,
potentially, execute arbitrary code as the user running SeaMonkey.
(CVE-2009-0040, CVE-2009-0772, CVE-2009-0774, CVE-2009-0775)
A flaw was found in the way malformed content was processed. A website
containing specially-crafted content could, potentially, trick a SeaMonkey
user into surrendering sensitive information. (CVE-2009-0776)
All SeaMonkey users should upgrade to these updated packages, which contain
backported patches that correct these issues. After installing the update,
SeaMonkey must be restarted for the changes to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated seamonkey packages that fix security issues are now available for\nRed Hat Enterprise Linux 2.1, 3, and 4.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "SeaMonkey is an open source Web browser, email and newsgroup client, IRC\nchat client, and HTML editor.\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause SeaMonkey to crash or,\npotentially, execute arbitrary code as the user running SeaMonkey.\n(CVE-2009-0040, CVE-2009-0772, CVE-2009-0774, CVE-2009-0775)\n\nA flaw was found in the way malformed content was processed. A website\ncontaining specially-crafted content could, potentially, trick a SeaMonkey\nuser into surrendering sensitive information. (CVE-2009-0776)\n\nAll SeaMonkey users should upgrade to these updated packages, which contain\nbackported patches that correct these issues. After installing the update,\nSeaMonkey must be restarted for the changes to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0325", "url": "https://access.redhat.com/errata/RHSA-2009:0325" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "486355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "category": "external", "summary": "488273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488273" }, { "category": "external", "summary": "488283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488283" }, { "category": "external", "summary": "488287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488287" }, { "category": "external", "summary": "488290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488290" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0325.json" } ], "title": "Red Hat Security Advisory: seamonkey security update", "tracking": { "current_release_date": "2024-11-22T02:33:58+00:00", "generator": { "date": "2024-11-22T02:33:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0325", "initial_release_date": "2009-03-05T00:48:00+00:00", "revision_history": [ { "date": "2009-03-05T00:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-04T20:00:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:33:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "product": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "product_id": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.30.el2?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-chat-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-devel-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.ia64", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.ia64", "product_id": "seamonkey-mail-0:1.0.9-38.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=ia64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-0:1.0.9-0.30.el2.src", "product": { "name": "seamonkey-0:1.0.9-0.30.el2.src", "product_id": "seamonkey-0:1.0.9-0.30.el2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.30.el2?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.src", "product": { "name": "seamonkey-0:1.0.9-38.el4.src", "product_id": "seamonkey-0:1.0.9-38.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=src" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.src", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.src", "product_id": "seamonkey-0:1.0.9-0.34.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "product": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "product_id": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.30.el2?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.i386", "product_id": "seamonkey-chat-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-0:1.0.9-38.el4.i386", "product_id": "seamonkey-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.i386", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.i386", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.i386", "product_id": "seamonkey-devel-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.i386", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.i386", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.i386", "product_id": "seamonkey-mail-0:1.0.9-38.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=i386" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-chat-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-devel-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.x86_64", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.x86_64", "product_id": "seamonkey-mail-0:1.0.9-38.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=x86_64" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-chat-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-devel-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.ppc", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.ppc", "product_id": "seamonkey-mail-0:1.0.9-38.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=ppc" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-chat-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-devel-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.s390x", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.s390x", "product_id": "seamonkey-mail-0:1.0.9-38.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=s390x" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-chat-0:1.0.9-38.el4.s390", "product_id": "seamonkey-chat-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-0:1.0.9-38.el4.s390", "product_id": "seamonkey-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390", "product_id": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390", "product_id": "seamonkey-debuginfo-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-devel-0:1.0.9-38.el4.s390", "product_id": "seamonkey-devel-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390", "product_id": "seamonkey-js-debugger-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-38.el4.s390", "product": { "name": "seamonkey-mail-0:1.0.9-38.el4.s390", "product_id": "seamonkey-mail-0:1.0.9-38.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-38.el4?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-debuginfo@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-chat@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nss-devel@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-devel@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-nspr-devel@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-dom-inspector@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-js-debugger@1.0.9-0.34.el3?arch=s390" } } }, { "category": "product_version", "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "product": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "product_id": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/seamonkey-mail@1.0.9-0.34.el3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-0:1.0.9-0.30.el2.src" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.src", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-chat-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-chat-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-js-debugger-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-mail-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-mail-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "2.1AS:seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.src as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-0:1.0.9-0.30.el2.src" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.src", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-chat-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-chat-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-js-debugger-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-mail-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-mail-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Linux Advanced Workstation 2.1", "product_id": "2.1AW:seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1AW" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.src as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-0:1.0.9-0.30.el2.src" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.src", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-chat-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-chat-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-js-debugger-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-mail-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-mail-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux ES version 2.1", "product_id": "2.1ES:seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.30.el2.src as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-0:1.0.9-0.30.el2.src" }, "product_reference": "seamonkey-0:1.0.9-0.30.el2.src", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-chat-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-chat-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-js-debugger-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-mail-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-mail-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-devel-0:1.0.9-0.30.el2.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.i386", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64 as a component of Red Hat Enterprise Linux WS version 2.1", "product_id": "2.1WS:seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.30.el2.ia64", "relates_to_product_reference": "2.1WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-chat-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-mail-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-chat-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-mail-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-chat-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-mail-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.src" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-chat-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-mail-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nspr-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.i386" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64" }, "product_reference": "seamonkey-nss-devel-0:1.0.9-0.34.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.src" }, "product_reference": "seamonkey-0:1.0.9-38.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-chat-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-chat-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-debuginfo-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-debuginfo-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-debuginfo-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-devel-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-devel-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-devel-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-dom-inspector-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-js-debugger-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-js-debugger-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-js-debugger-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-mail-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:seamonkey-mail-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-mail-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.i386" }, "product_reference": "seamonkey-0:1.0.9-38.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.ia64" }, "product_reference": "seamonkey-0:1.0.9-38.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.ppc" }, "product_reference": "seamonkey-0:1.0.9-38.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.s390" }, "product_reference": "seamonkey-0:1.0.9-38.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.s390x" }, "product_reference": "seamonkey-0:1.0.9-38.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.src" }, "product_reference": "seamonkey-0:1.0.9-38.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-0:1.0.9-38.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:seamonkey-0:1.0.9-38.el4.x86_64" }, "product_reference": "seamonkey-0:1.0.9-38.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "seamonkey-chat-0:1.0.9-38.el4.