Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2474
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[neon] 20090818 neon: release 0.28.6 (SECURITY)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "name": "[neon] 20090818 CVE-2009-2474: fix handling of NUL in SSL cert subject names", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "ADV-2009-2341", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "name": "oval:org.mitre.oval:def:11721", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" }, { "name": "MDVSA-2009:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "name": "36079", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36079" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "36371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36371" }, { "name": "USN-835-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "name": "FEDORA-2009-8815", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "name": "FEDORA-2009-8794", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "name": "36799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36799" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[neon] 20090818 neon: release 0.28.6 (SECURITY)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "name": "[neon] 20090818 CVE-2009-2474: fix handling of NUL in SSL cert subject names", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "ADV-2009-2341", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "name": "oval:org.mitre.oval:def:11721", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" }, { "name": "MDVSA-2009:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "name": "36079", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36079" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "36371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36371" }, { "name": "USN-835-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "name": "FEDORA-2009-8815", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "name": "FEDORA-2009-8794", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "name": "36799", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36799" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-2474", "datePublished": "2009-08-21T17:00:00", "dateReserved": "2009-07-15T00:00:00", "dateUpdated": "2024-08-07T05:52:14.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-2474\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-08-21T17:30:00.360\",\"lastModified\":\"2024-11-21T01:04:57.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.\"},{\"lang\":\"es\",\"value\":\"neon, en versiones anteriores a la 0.28.6, cuando OpenSSL est\u00e1 habilitado, no maneja adecuadamente un caracter \u0027\\\\0\u0027 en un nombre de dominio, en el campo Common Name (CN) del asunto de un certificado X.509, lo cual permite a atacacantes hombre-en-el-medio (man-in-the-middle) suplantar servidores SSL a su elecci\u00f3n a trav\u00e9s de certificados manipulados expedidos por una Autoridad de Certificaci\u00f3n (CA) leg\u00edtima, una cuesti\u00f3n relacionada con CVE-2009-2408.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.28.6\",\"matchCriteriaId\":\"55788024-3E66-4489-AC67-8162BB5E8182\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.6.5\",\"matchCriteriaId\":\"46E5D24A-8CA0-4590-9F35-F684D573D030\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7000D33B-F3C7-43E8-8FC7-9B97AADC3E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BB5EDB-520B-4DEF-B06E-65CA13152824\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36371\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36799\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:221\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36079\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-835-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2341\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/36079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-835-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2341\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
fkie_cve-2009-2474
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
webdav | neon | * | |
apple | mac_os_x | * | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 8.04 | |
canonical | ubuntu_linux | 8.10 | |
canonical | ubuntu_linux | 9.04 | |
fedoraproject | fedora | 10 | |
fedoraproject | fedora | 11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:*", "matchCriteriaId": "55788024-3E66-4489-AC67-8162BB5E8182", "versionEndExcluding": "0.28.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "46E5D24A-8CA0-4590-9F35-F684D573D030", "versionEndExcluding": "10.6.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "matchCriteriaId": "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." }, { "lang": "es", "value": "neon, en versiones anteriores a la 0.28.6, cuando OpenSSL est\u00e1 habilitado, no maneja adecuadamente un caracter \u0027\\0\u0027 en un nombre de dominio, en el campo Common Name (CN) del asunto de un certificado X.509, lo cual permite a atacacantes hombre-en-el-medio (man-in-the-middle) suplantar servidores SSL a su elecci\u00f3n a trav\u00e9s de certificados manipulados expedidos por una Autoridad de Certificaci\u00f3n (CA) leg\u00edtima, una cuesti\u00f3n relacionada con CVE-2009-2408." } ], "id": "CVE-2009-2474", "lastModified": "2024-11-21T01:04:57.673", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-08-21T17:30:00.360", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36371" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36799" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36079" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36799" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-326" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2009:1452
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated neon packages that fix two security issues are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "neon is an HTTP and WebDAV client library, with a C interface. It provides\na high-level interface to HTTP and WebDAV methods along with a low-level\ninterface for HTTP request handling. neon supports persistent connections,\nproxy servers, basic, digest and Kerberos authentication, and has complete\nSSL support.\n\nIt was discovered that neon is affected by the previously published \"null\nprefix attack\", caused by incorrect handling of NULL characters in X.509\ncertificates. If an attacker is able to get a carefully-crafted certificate\nsigned by a trusted Certificate Authority, the attacker could use the\ncertificate during a man-in-the-middle attack and potentially confuse an\napplication using the neon library into accepting it by mistake.\n(CVE-2009-2474)\n\nA denial of service flaw was found in the neon Extensible Markup Language\n(XML) parser. A remote attacker (malicious DAV server) could provide a\nspecially-crafted XML document that would cause excessive memory and CPU\nconsumption if an application using the neon XML parser was tricked into\nprocessing it. (CVE-2009-2473)\n\nAll neon users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Applications using the neon\nHTTP and WebDAV client library, such as cadaver, must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1452", "url": "https://access.redhat.com/errata/RHSA-2009:1452" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1452.json" } ], "title": "Red Hat Security Advisory: neon security update", "tracking": { "current_release_date": "2024-11-22T03:00:20+00:00", "generator": { "date": "2024-11-22T03:00:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1452", "initial_release_date": "2009-09-21T15:14:00+00:00", "revision_history": [ { "date": "2009-09-21T15:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-09-21T11:19:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.src", "product": { "name": "neon-0:0.25.5-10.el5_4.1.src", "product_id": "neon-0:0.25.5-10.el5_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=src" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.src", "product": { "name": "neon-0:0.24.7-4.el4_8.2.src", "product_id": "neon-0:0.24.7-4.el4_8.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2473", "discovery_date": "2009-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518215" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: billion laughs DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2473" }, { "category": "external", "summary": "RHBZ#518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: billion laughs DoS attack" }, { "cve": "CVE-2009-2474", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518223" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2474" }, { "category": "external", "summary": "RHBZ#518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2474", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields" } ] }
rhsa-2009_1452
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated neon packages that fix two security issues are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "neon is an HTTP and WebDAV client library, with a C interface. It provides\na high-level interface to HTTP and WebDAV methods along with a low-level\ninterface for HTTP request handling. neon supports persistent connections,\nproxy servers, basic, digest and Kerberos authentication, and has complete\nSSL support.\n\nIt was discovered that neon is affected by the previously published \"null\nprefix attack\", caused by incorrect handling of NULL characters in X.509\ncertificates. If an attacker is able to get a carefully-crafted certificate\nsigned by a trusted Certificate Authority, the attacker could use the\ncertificate during a man-in-the-middle attack and potentially confuse an\napplication using the neon library into accepting it by mistake.\n(CVE-2009-2474)\n\nA denial of service flaw was found in the neon Extensible Markup Language\n(XML) parser. A remote attacker (malicious DAV server) could provide a\nspecially-crafted XML document that would cause excessive memory and CPU\nconsumption if an application using the neon XML parser was tricked into\nprocessing it. (CVE-2009-2473)\n\nAll neon users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Applications using the neon\nHTTP and WebDAV client library, such as cadaver, must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1452", "url": "https://access.redhat.com/errata/RHSA-2009:1452" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1452.json" } ], "title": "Red Hat Security Advisory: neon security update", "tracking": { "current_release_date": "2024-11-22T03:00:20+00:00", "generator": { "date": "2024-11-22T03:00:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1452", "initial_release_date": "2009-09-21T15:14:00+00:00", "revision_history": [ { "date": "2009-09-21T15:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-09-21T11:19:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.src", "product": { "name": "neon-0:0.25.5-10.el5_4.1.src", "product_id": "neon-0:0.25.5-10.el5_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=src" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.src", "product": { "name": "neon-0:0.24.7-4.el4_8.2.src", "product_id": "neon-0:0.24.7-4.el4_8.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2473", "discovery_date": "2009-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518215" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: billion laughs DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2473" }, { "category": "external", "summary": "RHBZ#518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: billion laughs DoS attack" }, { "cve": "CVE-2009-2474", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518223" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2474" }, { "category": "external", "summary": "RHBZ#518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2474", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields" } ] }
RHSA-2009:1452
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated neon packages that fix two security issues are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "neon is an HTTP and WebDAV client library, with a C interface. It provides\na high-level interface to HTTP and WebDAV methods along with a low-level\ninterface for HTTP request handling. neon supports persistent connections,\nproxy servers, basic, digest and Kerberos authentication, and has complete\nSSL support.\n\nIt was discovered that neon is affected by the previously published \"null\nprefix attack\", caused by incorrect handling of NULL characters in X.509\ncertificates. If an attacker is able to get a carefully-crafted certificate\nsigned by a trusted Certificate Authority, the attacker could use the\ncertificate during a man-in-the-middle attack and potentially confuse an\napplication using the neon library into accepting it by mistake.\n(CVE-2009-2474)\n\nA denial of service flaw was found in the neon Extensible Markup Language\n(XML) parser. A remote attacker (malicious DAV server) could provide a\nspecially-crafted XML document that would cause excessive memory and CPU\nconsumption if an application using the neon XML parser was tricked into\nprocessing it. (CVE-2009-2473)\n\nAll neon users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Applications using the neon\nHTTP and WebDAV client library, such as cadaver, must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1452", "url": "https://access.redhat.com/errata/RHSA-2009:1452" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1452.json" } ], "title": "Red Hat Security Advisory: neon security update", "tracking": { "current_release_date": "2024-11-22T03:00:20+00:00", "generator": { "date": "2024-11-22T03:00:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1452", "initial_release_date": "2009-09-21T15:14:00+00:00", "revision_history": [ { "date": "2009-09-21T15:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-09-21T11:19:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:00:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_id": "neon-0:0.25.5-10.el5_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.i386", "product": { "name": "neon-0:0.25.5-10.el5_4.1.i386", "product_id": "neon-0:0.25.5-10.el5_4.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=i386" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=i386" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.src", "product": { "name": "neon-0:0.25.5-10.el5_4.1.src", "product_id": "neon-0:0.25.5-10.el5_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=src" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.src", "product": { "name": "neon-0:0.24.7-4.el4_8.2.src", "product_id": "neon-0:0.24.7-4.el4_8.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ia64", "product_id": "neon-0:0.25.5-10.el5_4.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ia64" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ia64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc64" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product": { "name": "neon-0:0.25.5-10.el5_4.1.ppc", "product_id": "neon-0:0.25.5-10.el5_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=ppc" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=ppc" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390x", "product_id": "neon-0:0.25.5-10.el5_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390x" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390x" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-devel-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.25.5-10.el5_4.1.s390", "product": { "name": "neon-0:0.25.5-10.el5_4.1.s390", "product_id": "neon-0:0.25.5-10.el5_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.25.5-10.el5_4.1?arch=s390" } } }, { "category": "product_version", "name": "neon-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-debuginfo@0.24.7-4.el4_8.2?arch=s390" } } }, { "category": "product_version", "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_id": "neon-devel-0:0.24.7-4.el4_8.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/neon-devel@0.24.7-4.el4_8.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.src" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.24.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64" }, "product_reference": "neon-devel-0:0.24.7-4.el4_8.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.src" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "neon-devel-0:0.25.5-10.el5_4.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" }, "product_reference": "neon-devel-0:0.25.5-10.el5_4.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2473", "discovery_date": "2009-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518215" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: billion laughs DoS attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2473" }, { "category": "external", "summary": "RHBZ#518215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2473" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: billion laughs DoS attack" }, { "cve": "CVE-2009-2474", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "518223" } ], "notes": [ { "category": "description", "text": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2474" }, { "category": "external", "summary": "RHBZ#518223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=518223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2474", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2474" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474" } ], "release_date": "2009-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-09-21T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1452" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS:neon-0:0.24.7-4.el4_8.2.i386", "4AS:neon-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-0:0.24.7-4.el4_8.2.s390", "4AS:neon-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-0:0.24.7-4.el4_8.2.src", "4AS:neon-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4AS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4AS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4AS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-0:0.24.7-4.el4_8.2.src", "4Desktop:neon-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.i386", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4Desktop:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-0:0.24.7-4.el4_8.2.i386", "4ES:neon-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-0:0.24.7-4.el4_8.2.s390", "4ES:neon-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-0:0.24.7-4.el4_8.2.src", "4ES:neon-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.i386", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4ES:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390", "4ES:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4ES:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-0:0.24.7-4.el4_8.2.i386", "4WS:neon-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-0:0.24.7-4.el4_8.2.s390", "4WS:neon-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-0:0.24.7-4.el4_8.2.src", "4WS:neon-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.i386", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.ppc64", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-debuginfo-0:0.24.7-4.el4_8.2.x86_64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.i386", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ia64", "4WS:neon-devel-0:0.24.7-4.el4_8.2.ppc", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390", "4WS:neon-devel-0:0.24.7-4.el4_8.2.s390x", "4WS:neon-devel-0:0.24.7-4.el4_8.2.x86_64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.src", "5Client-Workstation:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client-Workstation:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-0:0.25.5-10.el5_4.1.i386", "5Client:neon-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-0:0.25.5-10.el5_4.1.s390", "5Client:neon-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-0:0.25.5-10.el5_4.1.src", "5Client:neon-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Client:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Client:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Client:neon-devel-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-0:0.25.5-10.el5_4.1.i386", "5Server:neon-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-0:0.25.5-10.el5_4.1.s390", "5Server:neon-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-0:0.25.5-10.el5_4.1.src", "5Server:neon-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.i386", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-debuginfo-0:0.25.5-10.el5_4.1.x86_64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.i386", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ia64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc", "5Server:neon-devel-0:0.25.5-10.el5_4.1.ppc64", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390", "5Server:neon-devel-0:0.25.5-10.el5_4.1.s390x", "5Server:neon-devel-0:0.25.5-10.el5_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "neon: Improper verification of x509v3 certificate with NULL (zero) byte in certain fields" } ] }
ghsa-x9rv-vww8-vmj9
Vulnerability from github
neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
{ "affected": [], "aliases": [ "CVE-2009-2474" ], "database_specific": { "cwe_ids": [ "CWE-326" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-08-21T17:30:00Z", "severity": "MODERATE" }, "details": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GHSA-x9rv-vww8-vmj9", "modified": "2022-05-02T03:35:36Z", "published": "2022-05-02T03:35:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2474" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "type": "WEB", "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "type": "WEB", "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/36371" }, { "type": "WEB", "url": "http://secunia.com/advisories/36799" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4435" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/36079" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/2341" } ], "schema_version": "1.4.0", "severity": [] }
var-200908-0433
Vulnerability from variot
neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This vulnerability CVE-2009-2408 And is related.A crafted certificate allows any man-in-the-middle attacker to SSL There is a possibility of impersonating a server. This issue affects Neon when compiled against OpenSSL. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. Versions prior to Neon 0.28.6 are vulnerable. Additional applications that use the affected library may also be vulnerable. neon is an HTTP/1.1 and WebDAV client library with a C interface. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2009:221 http://www.mandriva.com/security/
Package : libneon0.27 Date : August 24, 2009 Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0
Problem Description:
Multiple vulnerabilities has been found and corrected in libneon0.27:
neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564 (CVE-2009-2473).
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474
Updated Packages:
Mandriva Linux 2008.1: 26729257d5b2255a8a6242cfe6931dc9 2008.1/i586/libneon0.27-0.28.3-0.2mdv2008.1.i586.rpm 992af0611f69a2e4043f29faf50de608 2008.1/i586/libneon0.27-devel-0.28.3-0.2mdv2008.1.i586.rpm 71e83652b0aa875f404ecf0df9409184 2008.1/i586/libneon0.27-static-devel-0.28.3-0.2mdv2008.1.i586.rpm a4b59dd8d54e66de85f70186c7726269 2008.1/SRPMS/libneon0.27-0.28.3-0.2mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: 56eb9b74f3e2202ac683377a16799c70 2008.1/x86_64/lib64neon0.27-0.28.3-0.2mdv2008.1.x86_64.rpm f688d9a1285f19e7b80997b52a147a60 2008.1/x86_64/lib64neon0.27-devel-0.28.3-0.2mdv2008.1.x86_64.rpm 08f5058e8dc35470e8cdc8cf9cb16381 2008.1/x86_64/lib64neon0.27-static-devel-0.28.3-0.2mdv2008.1.x86_64.rpm a4b59dd8d54e66de85f70186c7726269 2008.1/SRPMS/libneon0.27-0.28.3-0.2mdv2008.1.src.rpm
Mandriva Linux 2009.0: 9bf34661a2420bd2402cafc4565a2587 2009.0/i586/libneon0.27-0.28.3-1.1mdv2009.0.i586.rpm f6ed581464940115491ec68cacafe859 2009.0/i586/libneon0.27-devel-0.28.3-1.1mdv2009.0.i586.rpm db2dc25faa186ceb3394af63a9e2d0e6 2009.0/i586/libneon0.27-static-devel-0.28.3-1.1mdv2009.0.i586.rpm 14cbfad698a74067a74199807e8c9282 2009.0/SRPMS/libneon0.27-0.28.3-1.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: 3a86cf10f1df3feaea91ae64e28f3e8d 2009.0/x86_64/lib64neon0.27-0.28.3-1.1mdv2009.0.x86_64.rpm 872195ee41e00405d03ab18010bd15d9 2009.0/x86_64/lib64neon0.27-devel-0.28.3-1.1mdv2009.0.x86_64.rpm f841222c663bc8506e6e0e87a165c6b7 2009.0/x86_64/lib64neon0.27-static-devel-0.28.3-1.1mdv2009.0.x86_64.rpm 14cbfad698a74067a74199807e8c9282 2009.0/SRPMS/libneon0.27-0.28.3-1.1mdv2009.0.src.rpm
Mandriva Linux 2009.1: 14c6caacb5e2b3f9e0a2e7b7924ba1e3 2009.1/i586/libneon0.27-0.28.3-2.1mdv2009.1.i586.rpm 242e3182440acc212408d03d27ba9a08 2009.1/i586/libneon0.27-devel-0.28.3-2.1mdv2009.1.i586.rpm 71701b0c1b6931979cb6eabe377522aa 2009.1/i586/libneon0.27-static-devel-0.28.3-2.1mdv2009.1.i586.rpm 58bd3f3f6ac9178d9e4903fa88fd5862 2009.1/SRPMS/libneon0.27-0.28.3-2.1mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64: 5ac6a8cefa50849e32957b821ec1ef8c 2009.1/x86_64/lib64neon0.27-0.28.3-2.1mdv2009.1.x86_64.rpm 5b801b45bf9d73a59b7eb0a4b350431f 2009.1/x86_64/lib64neon0.27-devel-0.28.3-2.1mdv2009.1.x86_64.rpm 72e5bce2285b22ccd6b6f68c8c47bff8 2009.1/x86_64/lib64neon0.27-static-devel-0.28.3-2.1mdv2009.1.x86_64.rpm 58bd3f3f6ac9178d9e4903fa88fd5862 2009.1/SRPMS/libneon0.27-0.28.3-2.1mdv2009.1.src.rpm
Corporate 4.0: 6c92c285d835d3d283c820bbe14fa013 corporate/4.0/i586/libneon0.27-0.28.3-0.2.20060mlcs4.i586.rpm ae72e53a686010d7b31e56bee90000e5 corporate/4.0/i586/libneon0.27-devel-0.28.3-0.2.20060mlcs4.i586.rpm 1814371725d85bb607af694a074fc816 corporate/4.0/i586/libneon0.27-static-devel-0.28.3-0.2.20060mlcs4.i586.rpm 617b5c9c0bf440531b571e34409023b3 corporate/4.0/SRPMS/libneon0.27-0.28.3-0.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 9db63260cab1c01d8f6e3882f719a8a6 corporate/4.0/x86_64/lib64neon0.27-0.28.3-0.2.20060mlcs4.x86_64.rpm 526df150c547d98fdeeda8241774bcbf corporate/4.0/x86_64/lib64neon0.27-devel-0.28.3-0.2.20060mlcs4.x86_64.rpm 02fa7448bb3a59c6f0947a2e96983813 corporate/4.0/x86_64/lib64neon0.27-static-devel-0.28.3-0.2.20060mlcs4.x86_64.rpm 617b5c9c0bf440531b571e34409023b3 corporate/4.0/SRPMS/libneon0.27-0.28.3-0.2.20060mlcs4.src.rpm
Mandriva Enterprise Server 5: a2209a398a7f98673c5bd459dfa1fd58 mes5/i586/libneon0.27-0.28.3-1.1mdvmes5.i586.rpm 18631025bb665c21dcbd4ef75986dc2f mes5/i586/libneon0.27-devel-0.28.3-1.1mdvmes5.i586.rpm b216b56ea349e57db0bd1a06791c1192 mes5/i586/libneon0.27-static-devel-0.28.3-1.1mdvmes5.i586.rpm 2cd59a4c7297629446c6c0779363d6fd mes5/SRPMS/libneon0.27-0.28.3-1.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64: ee892ef74cca60e827899a0d9e06c8cd mes5/x86_64/lib64neon0.27-0.28.3-1.1mdvmes5.x86_64.rpm db0c1a9ab2315bf05dc35382349d4534 mes5/x86_64/lib64neon0.27-devel-0.28.3-1.1mdvmes5.x86_64.rpm 0c131d6264ef181e0b3870c8eb438b36 mes5/x86_64/lib64neon0.27-static-devel-0.28.3-1.1mdvmes5.x86_64.rpm 2cd59a4c7297629446c6c0779363d6fd mes5/SRPMS/libneon0.27-0.28.3-1.1mdvmes5.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKkvLkmqjQ0CJFipgRAq6qAJ9cjtiGVrF46gPqCQlUYpyiTrM/uwCgm9Wp 0gkprOAZM9dbBhPRDNeWeEs= =E/sr -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Packages for 2008.0 are being provided due to extended support for Corporate products.
For more information: SA31508 SA36371
SOLUTION: Apply updated packages.
-- Ubuntu 6.06 LTS --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.diff.gz Size/MD5: 21241 816587e0cf93ab4a4b83facb7768962f http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.dsc Size/MD5: 789 883a571edfb6ca2f265b6cc830b92cec http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg.orig.tar.gz Size/MD5: 633438 32ed43bea8568f8f592266c6ff6acf0f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_amd64.deb Size/MD5: 150072 8fe35489f1bf3c0d9dc029c737a3b400 http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_amd64.deb Size/MD5: 139964 1fc960e8c8d23498f73651158c5fed88 http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_amd64.deb Size/MD5: 105972 718aab24299009494603f217d680343e
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_i386.deb Size/MD5: 129460 850a2dcae6650b6cd360d8fd5e260306 http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_i386.deb Size/MD5: 127282 b29d4d5725a2b166a65317b39d927a2d http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_i386.deb Size/MD5: 98742 d925ff133a28cd973197e22b2e0d18e4
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_powerpc.deb Size/MD5: 149668 037f23da1f9566622a018632fe610c2d http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_powerpc.deb Size/MD5: 139344 f1fe92c7c7f59ca0968a1bb87d585717 http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_powerpc.deb Size/MD5: 102650 38eff65b3cb36fdf18b1a9c508ebbd56
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_sparc.deb Size/MD5: 131338 e204e6cb89e1bf96d3367c3bbf1487c1 http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_sparc.deb Size/MD5: 133516 213211b48418ed7388bb9235130efa9a http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_sparc.deb Size/MD5: 101588 3cb88debbc07258d7ee434b32262128e
-- Ubuntu 8.04 LTS --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.diff.gz Size/MD5: 20712 20939a5349b3b1d57c6ce3660e362f42 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.dsc Size/MD5: 939 a8ad0b6b6c520828fd7d00749897f26a http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2.orig.tar.gz Size/MD5: 812750 24d434a4d5d4b6ce8f076039688f60ce
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 176652 ed7021e0f6b21df0851aab43e6c008d3 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 402820 9f302f4e9031233a43d49b636706e13f http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 157874 ff25752134f938896a7b146169ddee49 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 376918 2615e14d72ec90aa8b42cf6ca0b379b2 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 108292 2539874993245e5a3e34fbc6ecf29fda http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_amd64.deb Size/MD5: 133262 70d032dcdcac2b62d0279504990f5d3e
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 170324 916695eae648a04716d6decd5afd454e http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 369116 6a079f855afcbf62debaec5b6d924d78 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 151426 654b963a71dcb4e96e4f37bf858a498f http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 344216 42923c3cd16536839d33e91391afe58a http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 103146 85cbd67c28eed802c146f49266986793 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_i386.deb Size/MD5: 127926 99fa358256515f29eab2057538cf3ee1
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 172252 eab88350f2284d5f9d74f8788555fc81 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 371158 8e97b2cc49f5213f127848b9bf760324 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 153228 191f3882e96d175eb9f58df4db377cdd http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 345646 026e6d7570cfcd8452aabc1aa4e430c5 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 102114 96bc6e6b22ca0c87c4542d447ef87f6c http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_lpia.deb Size/MD5: 127030 4e55fd691c2349280efceb57448dba6a
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 176704 c5cb99ca83490774d54ca181d537ead2 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 421734 a1465902d5fce2a81631971b3e7158a7 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 157946 a983b5baf576d1f065176ba12166cc19 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 391658 4a9785df166703eb6fa7c8132a98a3b1 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 110220 d885beccb5d7db7aace902b39ebd2cb5 http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_powerpc.deb Size/MD5: 134874 bdc0bd129db2bc565b514a86eff5aaef
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 162998 ff3ed6431bffadfc57c3f8a9d4cac74e http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 371204 fced2fe9f2cc105203c9fe518408c12c http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 144480 5d79c57d41605ab64dd46500e42e0843 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 343442 94b1d72e42b52c2164168f8d377773e8 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 103374 8c77263ab7d6181405005208022a1b06 http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_sparc.deb Size/MD5: 128486 e272c8dddd67ce4d87afbd4c90fedffa
-- Ubuntu 8.10 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.diff.gz Size/MD5: 23815 6f6b1e6ada9a523896127613b1f2a217 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.dsc Size/MD5: 1379 7ea5e427b97085cc7511afcdcedf857d http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2.orig.tar.gz Size/MD5: 797944 b99b3f44e8507ae2d17362f1b34aaf02
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 191520 f6ab3ecad18b6cd3d05e2751ffa7a5a9 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 428176 5830845f7612a0dba4efbe2a8021e4c4 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 172890 97942efd1db0a758e97bcdf37f0d8f76 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 402762 892c4c6fb330a202e7c3bb6202bb0a02 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 119264 d313c4dc3a6b379fbe4e2f973b5947e6 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_amd64.deb Size/MD5: 144902 7d580f2550b264fada435ec7597a5742
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 184370 3d50415bf133d4dfe276dfc03e71e020 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 393130 29bd3b6e83c131e6900c031805ba34fa http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 166050 f65eddb05aa5d975a7e122c84d7b7845 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 368212 eb7020e74a0311d2104976e1772b641a http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 114122 035e3b754e87e0cf46a8ec136caaa026 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_i386.deb Size/MD5: 139584 cfc9ceb5dcc52610fde529ffe5604da7
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 185900 17a1d4d1f1ab9708aa18e034fb7b29e1 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 394742 24f17a926e8a8c17b0273dab1c24a70e http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 167492 2c73ae4810ba0742f849803620595c74 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 370226 f7ff770cfcfd9a624db80a2c8100e436 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 113006 4e7446c38f409381e44fa3348d9cf16d http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_lpia.deb Size/MD5: 138624 a2de6a9c1ec02a3970f01052caccef64
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 191006 d2ae675e1836a76db2974ca4bb10a6d2 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 445778 75977229ba9371115dd80bd77b078230 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 173002 265636356f24a9fea8be60ca92938b37 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 415936 5f87a783c030a936ce9535a06f627785 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 120452 c543de922280e517454db6bdef402cde http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_powerpc.deb Size/MD5: 145836 cc66be766fd9275d137edd4ec11ed625
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 175622 3ba09f3066863bdf0520c2a8f8eb45ac http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 392552 359ede258a11a7d17457e24a98986775 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 156452 0ffb01d9c0bbfe97fe114af0d331fd3e http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 365460 79920f83cac355effe18b7bdc872c634 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 113430 f603e40fb8ec979f617a3d45b4bf5ce0 http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_sparc.deb Size/MD5: 139032 0ec4017b6acb3ef39f2a6f6d2447844b
-- Ubuntu 9.04 --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.diff.gz Size/MD5: 24132 da9be21a19b61748eda43f41a1aca91c http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.dsc Size/MD5: 1411 bae9926bff7220064db056ba7ce726f9 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2.orig.tar.gz Size/MD5: 797944 b99b3f44e8507ae2d17362f1b34aaf02
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 51354 8617736f3540ceb2c7fdd1b2a54d3dda http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 191964 1dd150f8babcfce047b839607bcac0f7 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 428610 00f874c335002728e868f365db185b04 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 173350 71cfa13feebdde24f2332a5bd0e73c0c http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 403366 a4e0c48c548fef1014e604e59c15b027 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 119684 52876e4cecf3b1ec6d8192eea3da2778 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_amd64.deb Size/MD5: 145328 3b6f9fe274456465097f4f41ac265e13
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 51354 93dde95d793a6ce061cb3af2db75a271 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 184882 8000f55c371f25d1ee87f91f9ca7f364 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 393574 b5ed91f1b2cc9306b482cd936cc5c78c http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 166604 b21c479d09f7e88e0510c12190d87296 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 368756 ee65f90a0496ed8128526a338ffd7fe7 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 114522 96bc36544b43d5e65727725e85b75ff0 http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_i386.deb Size/MD5: 140030 267bdfbc9b9784baf73857798a99967d
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 51352 97c0f618e1a8da22999f9904f78c573d http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 186410 5e20424a69ce45d3a66db001e5efb2dc http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 395242 372ebcd1dd210f2d5c136e9129b08ace http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 168082 cbe9aede94ebf50f2ba0ff571429efc8 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 370768 b9f57bf4900fa9ffe18a07fd71da3b8a http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 113406 1846871ab639b8a0bc919a65c1d09e6e http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_lpia.deb Size/MD5: 139088 66b63223d36d97786e6174173d267dcb
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 51354 07ee535da3df9885366f770800bd6598 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 191494 e7843d2987691be6246d6d1041dc4ca6 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 446240 b47ea0b823d1118a71591e83cbe0eb48 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 173578 a295423d33a38e5420988e1dac86e9b4 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 416384 5ea6c1bdb3c729500216f4deedad8dfc http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 120876 68ec1ef141c84bcad4ac4f84c547db17 http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_powerpc.deb Size/MD5: 146292 0984c79035eb76183dc9be0b79cbd721
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 51354 2024b1b2d5b26aef5fb0572e2daa8359 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 176196 4913aebd8db013e216c5e15fa4484ea9 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 393056 318c10bfa9e933e6b899608b48e1f8ce http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 156960 a3f9117577059313afe62e30ae9ca3d4 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 365968 45a35f598143a009cd432e1c5f146f36 http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 113806 ed7d45494f5bc5749abef18218b5c697 http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_sparc.deb Size/MD5: 139408 a5248c13c20456a323f932f8cd32b04c
ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-835-1
OTHER REFERENCES: SA31508: http://secunia.com/advisories/31508/
SA36371: http://secunia.com/advisories/36371/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. =========================================================== Ubuntu Security Notice USN-835-1 September 21, 2009 neon, neon27 vulnerabilities CVE-2008-3746, CVE-2009-2474 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libneon25 0.25.5.dfsg-5ubuntu0.1
Ubuntu 8.04 LTS: libneon27 0.27.2-1ubuntu0.1 libneon27-gnutls 0.27.2-1ubuntu0.1
Ubuntu 8.10: libneon27 0.28.2-2ubuntu0.1 libneon27-gnutls 0.28.2-2ubuntu0.1
Ubuntu 9.04: libneon27 0.28.2-6.1ubuntu0.1 libneon27-gnutls 0.28.2-6.1ubuntu0.1
In general, a standard system upgrade is sufficient to effect the necessary changes. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: neon Denial of Service and Spoofing Vulnerabilities
SECUNIA ADVISORY ID: SA36371
VERIFY ADVISORY: http://secunia.com/advisories/36371/
DESCRIPTION: Two vulnerabilities have been reported in neon, which can be exploited by malicious people to conduct spoofing attacks or cause a DoS (Denial of Service).
1) An error when expanding XML entities can be exploited to consume large amounts of memory and cause a crash or hang via a specially crafted XML document.
Successful exploitation of this vulnerability requires that the expat library is used.
2) An error when processing SSL certificates containing NULL characters embedded in certain certificate fields and can be exploited to spoof certificates for legitimate domains.
This is related to vulnerability #2 in: SA36093
The vulnerabilities are reported in versions prior to 0.28.6.
SOLUTION: Update to version 0.28.6.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html http://lists.manyfish.co.uk/pipermail/neon/2009-August/001045.html http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html
OTHER REFERENCES: SA36093: http://secunia.com/advisories/36093/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200908-0433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "neon", "scope": "lt", "trust": 1.8, "vendor": "webdav", "version": "0.28.6" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.10" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "11" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.04" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.6.5" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.06" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "9.04" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "10" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6 to v10.6.4" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6 to v10.6.4" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.4.z (server)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.23.2" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.23.0" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.21.0" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.21.2" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.23.1" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.23.3" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.2.1" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.22.0" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.21.3" }, { "model": "neon", "scope": "eq", "trust": 0.6, "vendor": "webdav", "version": "0.21.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.6" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4.5" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4.4" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4.3" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4.2" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4.1" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.4" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.3.5" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.2.6" }, { "model": "tortoisesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.1.7" }, { "model": "tortiosesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.6.4" }, { "model": "tortiosesvn", "scope": "eq", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.5" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es 4.8.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "hat enterprise linux eus 5.4.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux as 4.8.z", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "neon", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.28.5" }, { "model": "neon", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.28.3" }, { "model": "neon", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.28.2" }, { "model": "neon", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.28.1" }, { "model": "neon", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.28" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.26.3" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.26.2" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.26.1" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.26" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.6" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.5" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.4" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.3" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.2" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24.1" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.24" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.8" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.7" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.6" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.5" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.4" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.3" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.2" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23.1" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.23" }, { "model": "client library", "scope": "eq", "trust": 0.3, "vendor": "neon", "version": "0.19.3" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "intuity audix lx sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix lx sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "tortoisesvn", "scope": "ne", "trust": 0.3, "vendor": "tortoisesvn", "version": "1.6.5" }, { "model": "neon", "scope": "ne", "trust": 0.3, "vendor": "neon", "version": "0.28.6" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" } ], "sources": [ { "db": "BID", "id": "36079" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "CNNVD", "id": "CNNVD-200908-330" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:webdav:neon", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-002168" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joe Orton", "sources": [ { "db": "BID", "id": "36079" }, { "db": "CNNVD", "id": "CNNVD-200908-330" } ], "trust": 0.9 }, "cve": "CVE-2009-2474", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2009-2474", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2009-2474", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-39920", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2009-2474", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2009-2474", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200908-330", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-39920", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-39920" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "CNNVD", "id": "CNNVD-200908-330" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This vulnerability CVE-2009-2408 And is related.A crafted certificate allows any man-in-the-middle attacker to SSL There is a possibility of impersonating a server. \nThis issue affects Neon when compiled against OpenSSL. \nSuccessfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. \nVersions prior to Neon 0.28.6 are vulnerable. Additional applications that use the affected library may also be vulnerable. neon is an HTTP/1.1 and WebDAV client library with a C interface. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2009:221\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : libneon0.27\n Date : August 24, 2009\n Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been found and corrected in libneon0.27:\n \n neon before 0.28.6, when expat is used, does not properly detect\n recursion during entity expansion, which allows context-dependent\n attackers to cause a denial of service (memory and CPU consumption)\n via a crafted XML document containing a large number of nested entity\n references, a similar issue to CVE-2003-1564 (CVE-2009-2473). \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.1:\n 26729257d5b2255a8a6242cfe6931dc9 2008.1/i586/libneon0.27-0.28.3-0.2mdv2008.1.i586.rpm\n 992af0611f69a2e4043f29faf50de608 2008.1/i586/libneon0.27-devel-0.28.3-0.2mdv2008.1.i586.rpm\n 71e83652b0aa875f404ecf0df9409184 2008.1/i586/libneon0.27-static-devel-0.28.3-0.2mdv2008.1.i586.rpm \n a4b59dd8d54e66de85f70186c7726269 2008.1/SRPMS/libneon0.27-0.28.3-0.2mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 56eb9b74f3e2202ac683377a16799c70 2008.1/x86_64/lib64neon0.27-0.28.3-0.2mdv2008.1.x86_64.rpm\n f688d9a1285f19e7b80997b52a147a60 2008.1/x86_64/lib64neon0.27-devel-0.28.3-0.2mdv2008.1.x86_64.rpm\n 08f5058e8dc35470e8cdc8cf9cb16381 2008.1/x86_64/lib64neon0.27-static-devel-0.28.3-0.2mdv2008.1.x86_64.rpm \n a4b59dd8d54e66de85f70186c7726269 2008.1/SRPMS/libneon0.27-0.28.3-0.2mdv2008.1.src.rpm\n\n Mandriva Linux 2009.0:\n 9bf34661a2420bd2402cafc4565a2587 2009.0/i586/libneon0.27-0.28.3-1.1mdv2009.0.i586.rpm\n f6ed581464940115491ec68cacafe859 2009.0/i586/libneon0.27-devel-0.28.3-1.1mdv2009.0.i586.rpm\n db2dc25faa186ceb3394af63a9e2d0e6 2009.0/i586/libneon0.27-static-devel-0.28.3-1.1mdv2009.0.i586.rpm \n 14cbfad698a74067a74199807e8c9282 2009.0/SRPMS/libneon0.27-0.28.3-1.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n 3a86cf10f1df3feaea91ae64e28f3e8d 2009.0/x86_64/lib64neon0.27-0.28.3-1.1mdv2009.0.x86_64.rpm\n 872195ee41e00405d03ab18010bd15d9 2009.0/x86_64/lib64neon0.27-devel-0.28.3-1.1mdv2009.0.x86_64.rpm\n f841222c663bc8506e6e0e87a165c6b7 2009.0/x86_64/lib64neon0.27-static-devel-0.28.3-1.1mdv2009.0.x86_64.rpm \n 14cbfad698a74067a74199807e8c9282 2009.0/SRPMS/libneon0.27-0.28.3-1.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.1:\n 14c6caacb5e2b3f9e0a2e7b7924ba1e3 2009.1/i586/libneon0.27-0.28.3-2.1mdv2009.1.i586.rpm\n 242e3182440acc212408d03d27ba9a08 2009.1/i586/libneon0.27-devel-0.28.3-2.1mdv2009.1.i586.rpm\n 71701b0c1b6931979cb6eabe377522aa 2009.1/i586/libneon0.27-static-devel-0.28.3-2.1mdv2009.1.i586.rpm \n 58bd3f3f6ac9178d9e4903fa88fd5862 2009.1/SRPMS/libneon0.27-0.28.3-2.1mdv2009.1.src.rpm\n\n Mandriva Linux 2009.1/X86_64:\n 5ac6a8cefa50849e32957b821ec1ef8c 2009.1/x86_64/lib64neon0.27-0.28.3-2.1mdv2009.1.x86_64.rpm\n 5b801b45bf9d73a59b7eb0a4b350431f 2009.1/x86_64/lib64neon0.27-devel-0.28.3-2.1mdv2009.1.x86_64.rpm\n 72e5bce2285b22ccd6b6f68c8c47bff8 2009.1/x86_64/lib64neon0.27-static-devel-0.28.3-2.1mdv2009.1.x86_64.rpm \n 58bd3f3f6ac9178d9e4903fa88fd5862 2009.1/SRPMS/libneon0.27-0.28.3-2.1mdv2009.1.src.rpm\n\n Corporate 4.0:\n 6c92c285d835d3d283c820bbe14fa013 corporate/4.0/i586/libneon0.27-0.28.3-0.2.20060mlcs4.i586.rpm\n ae72e53a686010d7b31e56bee90000e5 corporate/4.0/i586/libneon0.27-devel-0.28.3-0.2.20060mlcs4.i586.rpm\n 1814371725d85bb607af694a074fc816 corporate/4.0/i586/libneon0.27-static-devel-0.28.3-0.2.20060mlcs4.i586.rpm \n 617b5c9c0bf440531b571e34409023b3 corporate/4.0/SRPMS/libneon0.27-0.28.3-0.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 9db63260cab1c01d8f6e3882f719a8a6 corporate/4.0/x86_64/lib64neon0.27-0.28.3-0.2.20060mlcs4.x86_64.rpm\n 526df150c547d98fdeeda8241774bcbf corporate/4.0/x86_64/lib64neon0.27-devel-0.28.3-0.2.20060mlcs4.x86_64.rpm\n 02fa7448bb3a59c6f0947a2e96983813 corporate/4.0/x86_64/lib64neon0.27-static-devel-0.28.3-0.2.20060mlcs4.x86_64.rpm \n 617b5c9c0bf440531b571e34409023b3 corporate/4.0/SRPMS/libneon0.27-0.28.3-0.2.20060mlcs4.src.rpm\n\n Mandriva Enterprise Server 5:\n a2209a398a7f98673c5bd459dfa1fd58 mes5/i586/libneon0.27-0.28.3-1.1mdvmes5.i586.rpm\n 18631025bb665c21dcbd4ef75986dc2f mes5/i586/libneon0.27-devel-0.28.3-1.1mdvmes5.i586.rpm\n b216b56ea349e57db0bd1a06791c1192 mes5/i586/libneon0.27-static-devel-0.28.3-1.1mdvmes5.i586.rpm \n 2cd59a4c7297629446c6c0779363d6fd mes5/SRPMS/libneon0.27-0.28.3-1.1mdvmes5.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n ee892ef74cca60e827899a0d9e06c8cd mes5/x86_64/lib64neon0.27-0.28.3-1.1mdvmes5.x86_64.rpm\n db0c1a9ab2315bf05dc35382349d4534 mes5/x86_64/lib64neon0.27-devel-0.28.3-1.1mdvmes5.x86_64.rpm\n 0c131d6264ef181e0b3870c8eb438b36 mes5/x86_64/lib64neon0.27-static-devel-0.28.3-1.1mdvmes5.x86_64.rpm \n 2cd59a4c7297629446c6c0779363d6fd mes5/SRPMS/libneon0.27-0.28.3-1.1mdvmes5.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFKkvLkmqjQ0CJFipgRAq6qAJ9cjtiGVrF46gPqCQlUYpyiTrM/uwCgm9Wp\n0gkprOAZM9dbBhPRDNeWeEs=\n=E/sr\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n \n Packages for 2008.0 are being provided due to extended support for\n Corporate products. \n\nFor more information:\nSA31508\nSA36371\n\nSOLUTION:\nApply updated packages. \n\n-- Ubuntu 6.06 LTS --\n\nSource archives:\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.diff.gz\nSize/MD5: 21241 816587e0cf93ab4a4b83facb7768962f\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.dsc\nSize/MD5: 789 883a571edfb6ca2f265b6cc830b92cec\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg.orig.tar.gz\nSize/MD5: 633438 32ed43bea8568f8f592266c6ff6acf0f\n\namd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_amd64.deb\nSize/MD5: 150072 8fe35489f1bf3c0d9dc029c737a3b400\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_amd64.deb\nSize/MD5: 139964 1fc960e8c8d23498f73651158c5fed88\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_amd64.deb\nSize/MD5: 105972 718aab24299009494603f217d680343e\n\ni386 architecture (x86 compatible Intel/AMD):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_i386.deb\nSize/MD5: 129460 850a2dcae6650b6cd360d8fd5e260306\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_i386.deb\nSize/MD5: 127282 b29d4d5725a2b166a65317b39d927a2d\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_i386.deb\nSize/MD5: 98742 d925ff133a28cd973197e22b2e0d18e4\n\npowerpc architecture (Apple Macintosh G3/G4/G5):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_powerpc.deb\nSize/MD5: 149668 037f23da1f9566622a018632fe610c2d\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_powerpc.deb\nSize/MD5: 139344 f1fe92c7c7f59ca0968a1bb87d585717\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_powerpc.deb\nSize/MD5: 102650 38eff65b3cb36fdf18b1a9c508ebbd56\n\nsparc architecture (Sun SPARC/UltraSPARC):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_sparc.deb\nSize/MD5: 131338 e204e6cb89e1bf96d3367c3bbf1487c1\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_sparc.deb\nSize/MD5: 133516 213211b48418ed7388bb9235130efa9a\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_sparc.deb\nSize/MD5: 101588 3cb88debbc07258d7ee434b32262128e\n\n-- Ubuntu 8.04 LTS --\n\nSource archives:\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.diff.gz\nSize/MD5: 20712 20939a5349b3b1d57c6ce3660e362f42\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.dsc\nSize/MD5: 939 a8ad0b6b6c520828fd7d00749897f26a\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2.orig.tar.gz\nSize/MD5: 812750 24d434a4d5d4b6ce8f076039688f60ce\n\namd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 176652 ed7021e0f6b21df0851aab43e6c008d3\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 402820 9f302f4e9031233a43d49b636706e13f\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 157874 ff25752134f938896a7b146169ddee49\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 376918 2615e14d72ec90aa8b42cf6ca0b379b2\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 108292 2539874993245e5a3e34fbc6ecf29fda\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_amd64.deb\nSize/MD5: 133262 70d032dcdcac2b62d0279504990f5d3e\n\ni386 architecture (x86 compatible Intel/AMD):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 170324 916695eae648a04716d6decd5afd454e\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 369116 6a079f855afcbf62debaec5b6d924d78\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 151426 654b963a71dcb4e96e4f37bf858a498f\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 344216 42923c3cd16536839d33e91391afe58a\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 103146 85cbd67c28eed802c146f49266986793\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_i386.deb\nSize/MD5: 127926 99fa358256515f29eab2057538cf3ee1\n\nlpia architecture (Low Power Intel Architecture):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 172252 eab88350f2284d5f9d74f8788555fc81\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 371158 8e97b2cc49f5213f127848b9bf760324\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 153228 191f3882e96d175eb9f58df4db377cdd\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 345646 026e6d7570cfcd8452aabc1aa4e430c5\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 102114 96bc6e6b22ca0c87c4542d447ef87f6c\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_lpia.deb\nSize/MD5: 127030 4e55fd691c2349280efceb57448dba6a\n\npowerpc architecture (Apple Macintosh G3/G4/G5):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 176704 c5cb99ca83490774d54ca181d537ead2\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 421734 a1465902d5fce2a81631971b3e7158a7\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 157946 a983b5baf576d1f065176ba12166cc19\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 391658 4a9785df166703eb6fa7c8132a98a3b1\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 110220 d885beccb5d7db7aace902b39ebd2cb5\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_powerpc.deb\nSize/MD5: 134874 bdc0bd129db2bc565b514a86eff5aaef\n\nsparc architecture (Sun SPARC/UltraSPARC):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 162998 ff3ed6431bffadfc57c3f8a9d4cac74e\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 371204 fced2fe9f2cc105203c9fe518408c12c\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 144480 5d79c57d41605ab64dd46500e42e0843\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 343442 94b1d72e42b52c2164168f8d377773e8\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 103374 8c77263ab7d6181405005208022a1b06\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_sparc.deb\nSize/MD5: 128486 e272c8dddd67ce4d87afbd4c90fedffa\n\n-- Ubuntu 8.10 --\n\nSource archives:\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.diff.gz\nSize/MD5: 23815 6f6b1e6ada9a523896127613b1f2a217\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.dsc\nSize/MD5: 1379 7ea5e427b97085cc7511afcdcedf857d\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2.orig.tar.gz\nSize/MD5: 797944 b99b3f44e8507ae2d17362f1b34aaf02\n\namd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 191520 f6ab3ecad18b6cd3d05e2751ffa7a5a9\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 428176 5830845f7612a0dba4efbe2a8021e4c4\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 172890 97942efd1db0a758e97bcdf37f0d8f76\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 402762 892c4c6fb330a202e7c3bb6202bb0a02\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 119264 d313c4dc3a6b379fbe4e2f973b5947e6\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_amd64.deb\nSize/MD5: 144902 7d580f2550b264fada435ec7597a5742\n\ni386 architecture (x86 compatible Intel/AMD):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 184370 3d50415bf133d4dfe276dfc03e71e020\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 393130 29bd3b6e83c131e6900c031805ba34fa\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 166050 f65eddb05aa5d975a7e122c84d7b7845\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 368212 eb7020e74a0311d2104976e1772b641a\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 114122 035e3b754e87e0cf46a8ec136caaa026\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_i386.deb\nSize/MD5: 139584 cfc9ceb5dcc52610fde529ffe5604da7\n\nlpia architecture (Low Power Intel Architecture):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 185900 17a1d4d1f1ab9708aa18e034fb7b29e1\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 394742 24f17a926e8a8c17b0273dab1c24a70e\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 167492 2c73ae4810ba0742f849803620595c74\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 370226 f7ff770cfcfd9a624db80a2c8100e436\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 113006 4e7446c38f409381e44fa3348d9cf16d\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_lpia.deb\nSize/MD5: 138624 a2de6a9c1ec02a3970f01052caccef64\n\npowerpc architecture (Apple Macintosh G3/G4/G5):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 191006 d2ae675e1836a76db2974ca4bb10a6d2\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 445778 75977229ba9371115dd80bd77b078230\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 173002 265636356f24a9fea8be60ca92938b37\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 415936 5f87a783c030a936ce9535a06f627785\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 120452 c543de922280e517454db6bdef402cde\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_powerpc.deb\nSize/MD5: 145836 cc66be766fd9275d137edd4ec11ed625\n\nsparc architecture (Sun SPARC/UltraSPARC):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 175622 3ba09f3066863bdf0520c2a8f8eb45ac\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 392552 359ede258a11a7d17457e24a98986775\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 156452 0ffb01d9c0bbfe97fe114af0d331fd3e\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 365460 79920f83cac355effe18b7bdc872c634\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 113430 f603e40fb8ec979f617a3d45b4bf5ce0\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_sparc.deb\nSize/MD5: 139032 0ec4017b6acb3ef39f2a6f6d2447844b\n\n-- Ubuntu 9.04 --\n\nSource archives:\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.diff.gz\nSize/MD5: 24132 da9be21a19b61748eda43f41a1aca91c\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.dsc\nSize/MD5: 1411 bae9926bff7220064db056ba7ce726f9\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2.orig.tar.gz\nSize/MD5: 797944 b99b3f44e8507ae2d17362f1b34aaf02\n\namd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 51354 8617736f3540ceb2c7fdd1b2a54d3dda\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 191964 1dd150f8babcfce047b839607bcac0f7\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 428610 00f874c335002728e868f365db185b04\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 173350 71cfa13feebdde24f2332a5bd0e73c0c\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 403366 a4e0c48c548fef1014e604e59c15b027\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 119684 52876e4cecf3b1ec6d8192eea3da2778\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_amd64.deb\nSize/MD5: 145328 3b6f9fe274456465097f4f41ac265e13\n\ni386 architecture (x86 compatible Intel/AMD):\n\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 51354 93dde95d793a6ce061cb3af2db75a271\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 184882 8000f55c371f25d1ee87f91f9ca7f364\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 393574 b5ed91f1b2cc9306b482cd936cc5c78c\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 166604 b21c479d09f7e88e0510c12190d87296\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 368756 ee65f90a0496ed8128526a338ffd7fe7\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 114522 96bc36544b43d5e65727725e85b75ff0\nhttp://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_i386.deb\nSize/MD5: 140030 267bdfbc9b9784baf73857798a99967d\n\nlpia architecture (Low Power Intel Architecture):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 51352 97c0f618e1a8da22999f9904f78c573d\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 186410 5e20424a69ce45d3a66db001e5efb2dc\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 395242 372ebcd1dd210f2d5c136e9129b08ace\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 168082 cbe9aede94ebf50f2ba0ff571429efc8\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 370768 b9f57bf4900fa9ffe18a07fd71da3b8a\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 113406 1846871ab639b8a0bc919a65c1d09e6e\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_lpia.deb\nSize/MD5: 139088 66b63223d36d97786e6174173d267dcb\n\npowerpc architecture (Apple Macintosh G3/G4/G5):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 51354 07ee535da3df9885366f770800bd6598\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 191494 e7843d2987691be6246d6d1041dc4ca6\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 446240 b47ea0b823d1118a71591e83cbe0eb48\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 173578 a295423d33a38e5420988e1dac86e9b4\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 416384 5ea6c1bdb3c729500216f4deedad8dfc\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 120876 68ec1ef141c84bcad4ac4f84c547db17\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_powerpc.deb\nSize/MD5: 146292 0984c79035eb76183dc9be0b79cbd721\n\nsparc architecture (Sun SPARC/UltraSPARC):\n\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 51354 2024b1b2d5b26aef5fb0572e2daa8359\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 176196 4913aebd8db013e216c5e15fa4484ea9\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 393056 318c10bfa9e933e6b899608b48e1f8ce\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 156960 a3f9117577059313afe62e30ae9ca3d4\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 365968 45a35f598143a009cd432e1c5f146f36\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 113806 ed7d45494f5bc5749abef18218b5c697\nhttp://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_sparc.deb\nSize/MD5: 139408 a5248c13c20456a323f932f8cd32b04c\n\nORIGINAL ADVISORY:\nhttp://www.ubuntu.com/usn/usn-835-1\n\nOTHER REFERENCES:\nSA31508:\nhttp://secunia.com/advisories/31508/\n\nSA36371:\nhttp://secunia.com/advisories/36371/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. ===========================================================\nUbuntu Security Notice USN-835-1 September 21, 2009\nneon, neon27 vulnerabilities\nCVE-2008-3746, CVE-2009-2474\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libneon25 0.25.5.dfsg-5ubuntu0.1\n\nUbuntu 8.04 LTS:\n libneon27 0.27.2-1ubuntu0.1\n libneon27-gnutls 0.27.2-1ubuntu0.1\n\nUbuntu 8.10:\n libneon27 0.28.2-2ubuntu0.1\n libneon27-gnutls 0.28.2-2ubuntu0.1\n\nUbuntu 9.04:\n libneon27 0.28.2-6.1ubuntu0.1\n libneon27-gnutls 0.28.2-6.1ubuntu0.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. A remote attacker could exploit this\nto perform a man in the middle attack to view sensitive information or\nalter encrypted communications. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nneon Denial of Service and Spoofing Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA36371\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36371/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in neon, which can be\nexploited by malicious people to conduct spoofing attacks or cause a\nDoS (Denial of Service). \n\n1) An error when expanding XML entities can be exploited to consume\nlarge amounts of memory and cause a crash or hang via a specially\ncrafted XML document. \n\nSuccessful exploitation of this vulnerability requires that the expat\nlibrary is used. \n\n2) An error when processing SSL certificates containing NULL\ncharacters embedded in certain certificate fields and can be\nexploited to spoof certificates for legitimate domains. \n\nThis is related to vulnerability #2 in:\nSA36093\n\nThe vulnerabilities are reported in versions prior to 0.28.6. \n\nSOLUTION:\nUpdate to version 0.28.6. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html\nhttp://lists.manyfish.co.uk/pipermail/neon/2009-August/001045.html\nhttp://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html\n\nOTHER REFERENCES:\nSA36093:\nhttp://secunia.com/advisories/36093/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-2474" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "BID", "id": "36079" }, { "db": "VULHUB", "id": "VHN-39920" }, { "db": "PACKETSTORM", "id": "80593" }, { "db": "PACKETSTORM", "id": "83478" }, { "db": "PACKETSTORM", "id": "81226" }, { "db": "PACKETSTORM", "id": "81562" }, { "db": "PACKETSTORM", "id": "81507" }, { "db": "PACKETSTORM", "id": "80811" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-39920", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-39920" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-2474", "trust": 3.2 }, { "db": "BID", "id": "36079", "trust": 2.8 }, { "db": "SECUNIA", "id": "36371", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2009-2341", "trust": 2.5 }, { "db": "SECUNIA", "id": "36799", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2009-002168", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200908-330", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "83478", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "81226", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-39920", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80593", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81562", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "81507", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-39920" }, { "db": "BID", "id": "36079" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "PACKETSTORM", "id": "80593" }, { "db": "PACKETSTORM", "id": "83478" }, { "db": "PACKETSTORM", "id": "81226" }, { "db": "PACKETSTORM", "id": "81562" }, { "db": "PACKETSTORM", "id": "81507" }, { "db": "PACKETSTORM", "id": "80811" }, { "db": "CNNVD", "id": "CNNVD-200908-330" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "id": "VAR-200908-0433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-39920" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:31:56.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4435", "trust": 0.8, "url": "http://support.apple.com/kb/HT4435" }, { "title": "HT4435", "trust": 0.8, "url": "http://support.apple.com/kb/HT4435?viewlocale=ja_JP" }, { "title": "neon-0.25.5-10AXS3.1", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=755" }, { "title": "1787", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1787" }, { "title": "neon", "trust": 0.8, "url": "http://www.webdav.org/neon/" }, { "title": "RHSA-2009:1452", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2009-1452.html" }, { "title": "RHSA-2009:1452", "trust": 0.8, "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1452J.html" }, { "title": "neon Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119427" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "CNNVD", "id": "CNNVD-200908-330" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-326", "trust": 1.1 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-39920" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/36079" }, { "trust": 2.5, "url": "http://secunia.com/advisories/36371" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "trust": 2.1, "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-august/001046.html" }, { "trust": 2.1, "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-august/001044.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "trust": 1.7, "url": "http://secunia.com/advisories/36799" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-august/msg00924.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2009-august/msg00945.html" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:221" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht4435" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11721" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2474" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu331391" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2474" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2474" }, { "trust": 0.3, "url": "http://www.webdav.org/neon/" }, { "trust": 0.3, "url": "http://tortoisesvn.net/node/378" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100066260" }, { "trust": 0.3, "url": "http://www.mandriva.com/security/" }, { "trust": 0.3, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.dsc" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.diff.gz" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2.orig.tar.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.diff.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-6.1ubuntu0.1.dsc" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.dsc" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg.orig.tar.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.27.2-1ubuntu0.1.dsc" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2.orig.tar.gz" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://secunia.com/advisories/36371/" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/neon_0.25.5.dfsg-5ubuntu0.1.diff.gz" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/neon27_0.28.2-2ubuntu0.1.diff.gz" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon25-dev_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dev_0.27.2-1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.27.2-1ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dev_0.25.5.dfsg-5ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dev_0.28.2-6.1ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.27.2-1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls-dev_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls_0.28.2-6.1ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25-dbg_0.25.5.dfsg-5ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-dbg_0.28.2-6.1ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dev_0.28.2-2ubuntu0.1_amd64.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon/libneon25_0.25.5.dfsg-5ubuntu0.1_powerpc.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-gnutls_0.28.2-2ubuntu0.1_lpia.deb" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/neon27/libneon27-gnutls-dbg_0.28.2-2ubuntu0.1_i386.deb" }, { "trust": 0.2, "url": "http://ports.ubuntu.com/pool/main/n/neon27/libneon27-dbg_0.27.2-1ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2473" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2473" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/36799/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/31508/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-3746" }, { "trust": 0.1, "url": "http://secunia.com/advisories/36093/" }, { "trust": 0.1, "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-august/001045.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-39920" }, { "db": "BID", "id": "36079" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "PACKETSTORM", "id": "80593" }, { "db": "PACKETSTORM", "id": "83478" }, { "db": "PACKETSTORM", "id": "81226" }, { "db": "PACKETSTORM", "id": "81562" }, { "db": "PACKETSTORM", "id": "81507" }, { "db": "PACKETSTORM", "id": "80811" }, { "db": "CNNVD", "id": "CNNVD-200908-330" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-39920" }, { "db": "BID", "id": "36079" }, { "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "db": "PACKETSTORM", "id": "80593" }, { "db": "PACKETSTORM", "id": "83478" }, { "db": "PACKETSTORM", "id": "81226" }, { "db": "PACKETSTORM", "id": "81562" }, { "db": "PACKETSTORM", "id": "81507" }, { "db": "PACKETSTORM", "id": "80811" }, { "db": "CNNVD", "id": "CNNVD-200908-330" }, { "db": "NVD", "id": "CVE-2009-2474" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-08-21T00:00:00", "db": "VULHUB", "id": "VHN-39920" }, { "date": "2009-08-18T00:00:00", "db": "BID", "id": "36079" }, { "date": "2009-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "date": "2009-08-25T02:59:31", "db": "PACKETSTORM", "id": "80593" }, { "date": "2009-12-05T04:20:01", "db": "PACKETSTORM", "id": "83478" }, { "date": "2009-09-11T23:36:07", "db": "PACKETSTORM", "id": "81226" }, { "date": "2009-09-23T05:54:31", "db": "PACKETSTORM", "id": "81562" }, { "date": "2009-09-21T22:57:55", "db": "PACKETSTORM", "id": "81507" }, { "date": "2009-09-01T12:31:22", "db": "PACKETSTORM", "id": "80811" }, { "date": "2009-08-21T00:00:00", "db": "CNNVD", "id": "CNNVD-200908-330" }, { "date": "2009-08-21T17:30:00.360000", "db": "NVD", "id": "CVE-2009-2474" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-22T00:00:00", "db": "VULHUB", "id": "VHN-39920" }, { "date": "2015-05-07T17:11:00", "db": "BID", "id": "36079" }, { "date": "2010-11-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-002168" }, { "date": "2020-05-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200908-330" }, { "date": "2024-11-21T01:04:57.673000", "db": "NVD", "id": "CVE-2009-2474" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "81507" }, { "db": "CNNVD", "id": "CNNVD-200908-330" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "neon In X.509 Any certificate processing SSL Vulnerability impersonating a server", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-002168" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-200908-330" } ], "trust": 0.6 } }
gsd-2009-2474
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2009-2474", "description": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GSD-2009-2474", "references": [ "https://www.suse.com/security/cve/CVE-2009-2474.html", "https://access.redhat.com/errata/RHSA-2009:1452", "https://linux.oracle.com/cve/CVE-2009-2474.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-2474" ], "details": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GSD-2009-2474", "modified": "2023-12-13T01:19:46.575594Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-2474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "MISC", "url": "http://support.apple.com/kb/HT4435" }, { "name": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html", "refsource": "MISC", "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "name": "http://secunia.com/advisories/36371", "refsource": "MISC", "url": "http://secunia.com/advisories/36371" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "name": "http://www.vupen.com/english/advisories/2009/2341", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "name": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html", "refsource": "MISC", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "name": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html", "refsource": "MISC", "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "name": "http://secunia.com/advisories/36799", "refsource": "MISC", "url": "http://secunia.com/advisories/36799" }, { "name": "http://www.securityfocus.com/bid/36079", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/36079" }, { "name": "http://www.ubuntu.com/usn/usn-835-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.28.6", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.6.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-2474" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-326" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2009-8815", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00945.html" }, { "name": "[neon] 20090818 neon: release 0.28.6 (SECURITY)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001044.html" }, { "name": "FEDORA-2009-8794", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00924.html" }, { "name": "36371", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36371" }, { "name": "[neon] 20090818 CVE-2009-2474: fix handling of NUL in SSL cert subject names", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.manyfish.co.uk/pipermail/neon/2009-August/001046.html" }, { "name": "ADV-2009-2341", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/2341" }, { "name": "MDVSA-2009:221", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:221" }, { "name": "36079", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/36079" }, { "name": "USN-835-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-835-1" }, { "name": "36799", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36799" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "oval:org.mitre.oval:def:11721", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11721" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-05-22T15:32Z", "publishedDate": "2009-08-21T17:30Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.