Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1425
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "name": "ADV-2011-0855", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "name": "1025284", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025284" }, { "name": "DSA-2219", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2219" }, { "name": "MDVSA-2011:063", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "name": "47135", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://trac.webkit.org/changeset/79159" }, { "name": "ADV-2011-1010", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "name": "[xmlsec] 20110331 New xmlsec 1.2.17 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "name": "44423", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44423" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "name": "RHSA-2011:0486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "name": "ADV-2011-1172", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "name": "44167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44167" }, { "name": "43920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "name": "ADV-2011-0858", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "name": "xmlsecurity-xmlfiles-sec-bypass(66506)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "name": "ADV-2011-0855", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "name": "1025284", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025284" }, { "name": "DSA-2219", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2219" }, { "name": "MDVSA-2011:063", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "name": "47135", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://trac.webkit.org/changeset/79159" }, { "name": "ADV-2011-1010", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "name": "[xmlsec] 20110331 New xmlsec 1.2.17 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "name": "44423", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44423" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "name": "RHSA-2011:0486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "name": "ADV-2011-1172", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "name": "44167", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44167" }, { "name": "43920", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "name": "ADV-2011-0858", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "name": "xmlsecurity-xmlfiles-sec-bypass(66506)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=692133", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "name": "ADV-2011-0855", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "name": "1025284", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025284" }, { "name": "DSA-2219", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2219" }, { "name": "MDVSA-2011:063", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "name": "47135", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47135" }, { "name": "http://trac.webkit.org/changeset/79159", "refsource": "CONFIRM", "url": "http://trac.webkit.org/changeset/79159" }, { "name": "ADV-2011-1010", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "name": "[xmlsec] 20110331 New xmlsec 1.2.17 release", "refsource": "MLIST", "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "name": "44423", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44423" }, { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780", "refsource": "CONFIRM", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "name": "RHSA-2011:0486", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa", "refsource": "CONFIRM", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "name": "ADV-2011-1172", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "name": "44167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44167" }, { "name": "43920", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43920" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=52688", "refsource": "CONFIRM", "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "name": "ADV-2011-0858", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "name": "xmlsecurity-xmlfiles-sec-bypass(66506)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-1425", "datePublished": "2011-04-03T01:00:00", "dateReserved": "2011-03-14T00:00:00", "dateUpdated": "2024-08-06T22:28:41.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-1425\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-04-04T12:27:57.437\",\"lastModified\":\"2024-11-21T01:26:16.960\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.\"},{\"lang\":\"es\",\"value\":\"xslt.c en XML Security Library (tambi\u00e9n conocido como xmlsec)anterior a v1.2.17 como se usaba en WebKit y otros productos, cuando XSLT es habilitado, permite a atacantes remotos crear o sobreescribir archivos de su elecci\u00f3n a trav\u00e9s de vectores que involucran la extensi\u00f3n de salida libxslt y un elemento ds:Transform durante la verificaci\u00f3n de firma.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.16\",\"matchCriteriaId\":\"3C511EF6-D408-40F6-B698-5C4179FA1D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48013BD3-56E4-4882-8DE6-66E17C5E2700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4381CEA6-37E4-4AD0-9247-74EC552D3A93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104D29A5-117F-4BF2-BBC0-744EB7B14699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7349086B-57F4-407B-B6D7-34906B74CC1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66221F0D-6BA6-4892-B820-3C1190935167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7167841F-F3BB-4641-B004-CB73C73DC61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29567BC6-1D73-4B8D-B518-35BE505ECC56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73030AD3-5DA1-4047-96C7-AEDC110844EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC46659-2D47-4F7D-87DA-17120BB94F31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C930806C-7025-4201-AAC1-1717A1547096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2E3C32-7F16-4E69-A73E-FE26C04CF9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACBE500-4813-42C6-8108-1E8A105EA7DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B014F4-3CDE-41C2-A822-09751DAD1A0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F82EE1-A737-41D9-95B6-66504747D107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2888ED-A494-4D69-8F60-8D8D63FB3FA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34AE6EB-A099-40F6-8524-4B4F6995D5CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39911070-E4D2-419F-9861-8CBA02527FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D76F2C1-9FBC-4FFE-AB60-526D74247E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A505E1-5891-43B1-955D-663EFE3E489C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB3566E-3F7F-490B-9DF4-BCFE22C6D29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DCD31F-DA97-469E-9739-CA4D358107FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC086D9-DCD7-4B11-B6EB-7FE6455B68F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3CD349-D3A0-4FB7-B717-2AF2F3F8574F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFD0250E-7971-4890-A0FC-A4EF6CAB17FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766B027F-7938-4768-B714-160278981634\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1235A593-FADF-42BC-9FAA-15E7D1A30397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55CCEF0C-83B0-4EA4-9771-1D5E93597439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37908D6B-A4A4-4879-8153-4580B2FD937C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1253AC74-B285-4784-A08C-C8E5EC0693FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9817DA5-858D-4543-A033-D294275F1686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D550EAB0-1C45-4137-AFF0-245DD79DC617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A459702-8FAD-4854-8425-C44F1A76FA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EC24DFE-04AE-43B8-A8AA-9429492B71CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9552F93-EDE1-49A8-9BD7-D3BBE5FD3261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A79CF64-1F88-46B1-BE59-27A8474109C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0869B698-2FAC-4AF3-9897-937577121FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0500195F-A2C6-4D0B-A5AC-98AF00AF427E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AADDA51-66A9-42B5-AAFF-708A8EBE983A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B34BB41-AB3E-468C-942E-A95A087DFA17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA8E9710-E55C-4E00-B3E1-FD7A471F5B48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB51E6A-A99B-44A3-AF37-D685E61BC9C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"009BDE1D-C3B9-4EC7-8149-6074AA8EEB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461EFB63-7933-488C-BB4E-7C913364F5A9\"}]}]}],\"references\":[{\"url\":\"http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/43920\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/44167\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44423\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://trac.webkit.org/changeset/79159\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.aleksey.com/pipermail/xmlsec/2011/009120.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2219\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:063\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0486.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/47135\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1025284\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0858\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/1010\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/1172\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.webkit.org/show_bug.cgi?id=52688\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=692133\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66506\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/43920\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/44167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://trac.webkit.org/changeset/79159\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.aleksey.com/pipermail/xmlsec/2011/009120.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0486.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/1010\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/1172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.webkit.org/show_bug.cgi?id=52688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=692133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2011-1425
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-1425", "description": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.", "id": "GSD-2011-1425", "references": [ "https://www.suse.com/security/cve/CVE-2011-1425.html", "https://www.debian.org/security/2011/dsa-2219", "https://access.redhat.com/errata/RHSA-2011:0486", "https://linux.oracle.com/cve/CVE-2011-1425.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-1425" ], "details": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.", "id": "GSD-2011-1425", "modified": "2023-12-13T01:19:08.741242Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=692133", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "name": "ADV-2011-0855", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "name": "1025284", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025284" }, { "name": "DSA-2219", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2219" }, { "name": "MDVSA-2011:063", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "name": "47135", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47135" }, { "name": "http://trac.webkit.org/changeset/79159", "refsource": "CONFIRM", "url": "http://trac.webkit.org/changeset/79159" }, { "name": "ADV-2011-1010", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "name": "[xmlsec] 20110331 New xmlsec 1.2.17 release", "refsource": "MLIST", "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "name": "44423", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44423" }, { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780", "refsource": "CONFIRM", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "name": "RHSA-2011:0486", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa", "refsource": "CONFIRM", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "name": "ADV-2011-1172", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "name": "44167", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44167" }, { "name": "43920", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43920" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=52688", "refsource": "CONFIRM", "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "name": "ADV-2011-0858", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "name": "xmlsecurity-xmlfiles-sec-bypass(66506)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.2.16", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-1425" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "name": "[xmlsec] 20110331 New xmlsec 1.2.17 release", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "name": "43920", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43920" }, { "name": "https://bugs.webkit.org/show_bug.cgi?id=52688", "refsource": "CONFIRM", "tags": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "name": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "name": "http://trac.webkit.org/changeset/79159", "refsource": "CONFIRM", "tags": [], "url": "http://trac.webkit.org/changeset/79159" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=692133", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "name": "DSA-2219", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2011/dsa-2219" }, { "name": "44167", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/44167" }, { "name": "ADV-2011-1010", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "name": "44423", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/44423" }, { "name": "RHSA-2011:0486", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "name": "MDVSA-2011:063", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "name": "ADV-2011-1172", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "name": "1025284", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1025284" }, { "name": "ADV-2011-0855", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "name": "ADV-2011-0858", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "name": "47135", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/47135" }, { "name": "xmlsecurity-xmlfiles-sec-bypass(66506)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-08-17T01:34Z", "publishedDate": "2011-04-04T12:27Z" } } }
ghsa-63qq-pm7h-vc34
Vulnerability from github
xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.
{ "affected": [], "aliases": [ "CVE-2011-1425" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-04-04T12:27:00Z", "severity": "MODERATE" }, "details": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.", "id": "GHSA-63qq-pm7h-vc34", "modified": "2022-05-17T02:00:35Z", "published": "2022-05-17T02:00:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1425" }, { "type": "WEB", "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" }, { "type": "WEB", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "type": "WEB", "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "type": "WEB", "url": "http://secunia.com/advisories/43920" }, { "type": "WEB", "url": "http://secunia.com/advisories/44167" }, { "type": "WEB", "url": "http://secunia.com/advisories/44423" }, { "type": "WEB", "url": "http://trac.webkit.org/changeset/79159" }, { "type": "WEB", "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2219" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:063" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0486.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/47135" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1025284" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/1172" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2011_0486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xmlsec1 packages that fix one security issue and one bug are now\navailable for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The XML Security Library is a C library based on libxml2 and OpenSSL that\nimplements the XML Digital Signature and XML Encryption standards.\n\nA flaw was found in the way xmlsec1 handled XML files that contain an XSLT\ntransformation specification. A specially-crafted XML file could cause\nxmlsec1 to create or overwrite an arbitrary file while performing the\nverification of a file\u0027s digital signature. (CVE-2011-1425)\n\nRed Hat would like to thank Nicolas Gr\u00e9goire and Aleksey Sanin for\nreporting this issue.\n\nThis update also fixes the following bug:\n\n* xmlsec1 previously used an incorrect search path when searching for\ncrypto plug-in libraries, possibly trying to access such libraries using a\nrelative path. (BZ#558480, BZ#700467)\n\nUsers of xmlsec1 should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the update,\nall running applications that use the xmlsec1 library must be restarted for\nthe update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0486", "url": "https://access.redhat.com/errata/RHSA-2011:0486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "558480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558480" }, { "category": "external", "summary": "692133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "category": "external", "summary": "700467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=700467" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0486.json" } ], "title": "Red Hat Security Advisory: xmlsec1 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:20:55+00:00", "generator": { "date": "2024-11-22T04:20:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0486", "initial_release_date": "2011-05-04T21:33:00+00:00", "revision_history": [ { "date": "2011-05-04T21:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-05-04T17:36:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:20:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.ia64", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.ia64", "product_id": "xmlsec1-devel-0:1.2.6-3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.ia64", "product": { "name": "xmlsec1-0:1.2.6-3.2.ia64", "product_id": "xmlsec1-0:1.2.6-3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=ia64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.ia64", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.ia64", "product_id": "xmlsec1-0:1.2.9-8.1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.i386", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.i386", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.i386", "product": { "name": "xmlsec1-0:1.2.6-3.2.i386", "product_id": "xmlsec1-0:1.2.6-3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.i386", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.i386", "product_id": "xmlsec1-devel-0:1.2.6-3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=i386" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.i386", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.i386", "product_id": "xmlsec1-0:1.2.9-8.1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "product_id": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.x86_64", "product": { "name": "xmlsec1-0:1.2.6-3.2.x86_64", "product_id": "xmlsec1-0:1.2.6-3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=x86_64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.x86_64", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.x86_64", "product_id": "xmlsec1-0:1.2.9-8.1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.src", "product": { "name": "xmlsec1-0:1.2.6-3.2.src", "product_id": "xmlsec1-0:1.2.6-3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=src" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.src", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.src", "product_id": "xmlsec1-0:1.2.9-8.1.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.ppc", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.ppc", "product_id": "xmlsec1-devel-0:1.2.6-3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.ppc", "product": { "name": "xmlsec1-0:1.2.6-3.2.ppc", "product_id": "xmlsec1-0:1.2.6-3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=ppc" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.ppc", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.ppc", "product_id": "xmlsec1-0:1.2.9-8.1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.ppc64", "product": { "name": "xmlsec1-0:1.2.6-3.2.ppc64", "product_id": "xmlsec1-0:1.2.6-3.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=ppc64" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.ppc64", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.ppc64", "product_id": "xmlsec1-0:1.2.9-8.1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.s390x", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390x", "product_id": "xmlsec1-devel-0:1.2.6-3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.s390x", "product": { "name": "xmlsec1-0:1.2.6-3.2.s390x", "product_id": "xmlsec1-0:1.2.6-3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=s390x" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.s390x", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.s390x", "product_id": "xmlsec1-0:1.2.9-8.1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "product": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "product_id": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.6-3.2.s390", "product": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390", "product_id": "xmlsec1-openssl-0:1.2.6-3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.6-3.2.s390", "product": { "name": "xmlsec1-0:1.2.6-3.2.s390", "product_id": "xmlsec1-0:1.2.6-3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "product": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "product_id": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.6-3.2.s390", "product": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390", "product_id": "xmlsec1-devel-0:1.2.6-3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-devel-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-openssl-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-nss-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.2?arch=s390" } } }, { "category": "product_version", "name": "xmlsec1-0:1.2.9-8.1.2.s390", "product": { "name": "xmlsec1-0:1.2.9-8.1.2.s390", "product_id": "xmlsec1-0:1.2.9-8.1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-0:1.2.6-3.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.src" }, "product_reference": "xmlsec1-0:1.2.6-3.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-0:1.2.6-3.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.src" }, "product_reference": "xmlsec1-0:1.2.6-3.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-0:1.2.6-3.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.src" }, "product_reference": "xmlsec1-0:1.2.6-3.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-0:1.2.6-3.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.src" }, "product_reference": "xmlsec1-0:1.2.6-3.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.src" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-devel-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64" }, "product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64", "relates_to_product_reference": "5Server-5.6.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Nicolas Gr\u00e9goire", "Aleksey Sanin" ] } ], "cve": "CVE-2011-1425", "discovery_date": "2011-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "692133" } ], "notes": [ { "category": "description", "text": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlsec1: arbitrary file creation when verifying signatures", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:xmlsec1-0:1.2.6-3.2.i386", "4AS:xmlsec1-0:1.2.6-3.2.ia64", "4AS:xmlsec1-0:1.2.6-3.2.ppc", "4AS:xmlsec1-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-0:1.2.6-3.2.s390", "4AS:xmlsec1-0:1.2.6-3.2.s390x", "4AS:xmlsec1-0:1.2.6-3.2.src", "4AS:xmlsec1-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-0:1.2.6-3.2.src", "4Desktop:xmlsec1-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-0:1.2.6-3.2.i386", "4ES:xmlsec1-0:1.2.6-3.2.ia64", "4ES:xmlsec1-0:1.2.6-3.2.ppc", "4ES:xmlsec1-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-0:1.2.6-3.2.s390", "4ES:xmlsec1-0:1.2.6-3.2.s390x", "4ES:xmlsec1-0:1.2.6-3.2.src", "4ES:xmlsec1-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-0:1.2.6-3.2.i386", "4WS:xmlsec1-0:1.2.6-3.2.ia64", "4WS:xmlsec1-0:1.2.6-3.2.ppc", "4WS:xmlsec1-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-0:1.2.6-3.2.s390", "4WS:xmlsec1-0:1.2.6-3.2.s390x", "4WS:xmlsec1-0:1.2.6-3.2.src", "4WS:xmlsec1-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.src", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1425" }, { "category": "external", "summary": "RHBZ#692133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1425", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1425" } ], "release_date": "2011-03-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-04T21:33:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:xmlsec1-0:1.2.6-3.2.i386", "4AS:xmlsec1-0:1.2.6-3.2.ia64", "4AS:xmlsec1-0:1.2.6-3.2.ppc", "4AS:xmlsec1-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-0:1.2.6-3.2.s390", "4AS:xmlsec1-0:1.2.6-3.2.s390x", "4AS:xmlsec1-0:1.2.6-3.2.src", "4AS:xmlsec1-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-0:1.2.6-3.2.src", "4Desktop:xmlsec1-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-0:1.2.6-3.2.i386", "4ES:xmlsec1-0:1.2.6-3.2.ia64", "4ES:xmlsec1-0:1.2.6-3.2.ppc", "4ES:xmlsec1-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-0:1.2.6-3.2.s390", "4ES:xmlsec1-0:1.2.6-3.2.s390x", "4ES:xmlsec1-0:1.2.6-3.2.src", "4ES:xmlsec1-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-0:1.2.6-3.2.i386", "4WS:xmlsec1-0:1.2.6-3.2.ia64", "4WS:xmlsec1-0:1.2.6-3.2.ppc", "4WS:xmlsec1-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-0:1.2.6-3.2.s390", "4WS:xmlsec1-0:1.2.6-3.2.s390x", "4WS:xmlsec1-0:1.2.6-3.2.src", "4WS:xmlsec1-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.src", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:xmlsec1-0:1.2.6-3.2.i386", "4AS:xmlsec1-0:1.2.6-3.2.ia64", "4AS:xmlsec1-0:1.2.6-3.2.ppc", "4AS:xmlsec1-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-0:1.2.6-3.2.s390", "4AS:xmlsec1-0:1.2.6-3.2.s390x", "4AS:xmlsec1-0:1.2.6-3.2.src", "4AS:xmlsec1-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4AS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4AS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-0:1.2.6-3.2.src", "4Desktop:xmlsec1-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-0:1.2.6-3.2.i386", "4ES:xmlsec1-0:1.2.6-3.2.ia64", "4ES:xmlsec1-0:1.2.6-3.2.ppc", "4ES:xmlsec1-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-0:1.2.6-3.2.s390", "4ES:xmlsec1-0:1.2.6-3.2.s390x", "4ES:xmlsec1-0:1.2.6-3.2.src", "4ES:xmlsec1-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4ES:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4ES:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-0:1.2.6-3.2.i386", "4WS:xmlsec1-0:1.2.6-3.2.ia64", "4WS:xmlsec1-0:1.2.6-3.2.ppc", "4WS:xmlsec1-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-0:1.2.6-3.2.s390", "4WS:xmlsec1-0:1.2.6-3.2.s390x", "4WS:xmlsec1-0:1.2.6-3.2.src", "4WS:xmlsec1-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.i386", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ia64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.s390x", "4WS:xmlsec1-debuginfo-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-devel-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-0:1.2.6-3.2.ppc64", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-0:1.2.6-3.2.x86_64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.i386", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ia64", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.ppc", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.s390x", "4WS:xmlsec1-openssl-devel-0:1.2.6-3.2.x86_64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.src", "5Server-5.6.Z:xmlsec1-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-debuginfo-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-gnutls-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-nss-devel-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-0:1.2.9-8.1.2.x86_64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.i386", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ia64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.ppc64", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.s390x", "5Server-5.6.Z:xmlsec1-openssl-devel-0:1.2.9-8.1.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xmlsec1: arbitrary file creation when verifying signatures" } ] }
var-201104-0096
Vulnerability from variot
xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification. Remote attackers can exploit this issue to read or write to arbitrary XML files. This may lead to further attacks. Versions prior to XML Security Library 1.2.17 are vulnerable.
For the oldstable distribution (lenny), this problem has been fixed in version 1.2.9-5+lenny1.
For the stable distribution (squeeze), this problem has been fixed in version 1.2.14-1+squeeze1.
For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 1.2.14-1.1. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.
For more information: SA43920
SOLUTION: Apply updated packages via the apt-get package manager. ----------------------------------------------------------------------
Secunia Research and vulnerability disclosures coordinated by Secunia:
http://secunia.com/research/
TITLE: XML Security Library XSLT File Access Vulnerability
SECUNIA ADVISORY ID: SA43920
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43920/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43920
RELEASE DATE: 2011-04-02
DISCUSS ADVISORY: http://secunia.com/advisories/43920/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43920/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43920
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in the XML Security Library, which can be exploited by malicious people to compromise a vulnerable system.
SOLUTION: Update to version 1.2.17.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Nicolas Gregoire.
ORIGINAL ADVISORY: http://www.aleksey.com/pipermail/xmlsec/2011/009120.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-09
http://security.gentoo.org/
Severity: High Title: Multiple packages, Multiple vulnerabilities fixed in 2011 Date: December 11, 2014 Bugs: #194151, #294253, #294256, #334087, #344059, #346897, #350598, #352608, #354209, #355207, #356893, #358611, #358785, #358789, #360891, #361397, #362185, #366697, #366699, #369069, #370839, #372971, #376793, #381169, #386321, #386361 ID: 201412-09
Synopsis
This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2012. The worst of these vulnerabilities could lead to local privilege escalation and remote code execution. Please see the package list and CVE identifiers below for more information.
Background
For more information on the packages listed in this GLSA, please see their homepage referenced in the ebuild.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 games-sports/racer-bin >= 0.5.0-r1 Vulnerable! 2 media-libs/fmod < 4.38.00 >= 4.38.00 3 dev-php/PEAR-Mail < 1.2.0 >= 1.2.0 4 sys-fs/lvm2 < 2.02.72 >= 2.02.72 5 app-office/gnucash < 2.4.4 >= 2.4.4 6 media-libs/xine-lib < 1.1.19 >= 1.1.19 7 media-sound/lastfmplayer < 1.5.4.26862-r3 >= 1.5.4.26862-r3 8 net-libs/webkit-gtk < 1.2.7 >= 1.2.7 9 sys-apps/shadow < 4.1.4.3 >= 4.1.4.3 10 dev-php/PEAR-PEAR < 1.9.2-r1 >= 1.9.2-r1 11 dev-db/unixODBC < 2.3.0-r1 >= 2.3.0-r1 12 sys-cluster/resource-agents < 1.0.4-r1 >= 1.0.4-r1 13 net-misc/mrouted < 3.9.5 >= 3.9.5 14 net-misc/rsync < 3.0.8 >= 3.0.8 15 dev-libs/xmlsec < 1.2.17 >= 1.2.17 16 x11-apps/xrdb < 1.0.9 >= 1.0.9 17 net-misc/vino < 2.32.2 >= 2.32.2 18 dev-util/oprofile < 0.9.6-r1 >= 0.9.6-r1 19 app-admin/syslog-ng < 3.2.4 >= 3.2.4 20 net-analyzer/sflowtool < 3.20 >= 3.20 21 gnome-base/gdm < 3.8.4-r3 >= 3.8.4-r3 22 net-libs/libsoup < 2.34.3 >= 2.34.3 23 app-misc/ca-certificates < 20110502-r1 >= 20110502-r1 24 dev-vcs/gitolite < 1.5.9.1 >= 1.5.9.1 25 dev-util/qt-creator < 2.1.0 >= 2.1.0 ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 25 affected packages
Description
Vulnerabilities have been discovered in the packages listed below. Please review the CVE identifiers in the Reference section for details.
- FMOD Studio
- PEAR Mail
- LVM2
- GnuCash
- xine-lib
- Last.fm Scrobbler
- WebKitGTK+
- shadow tool suite
- PEAR
- unixODBC
- Resource Agents
- mrouted
- rsync
- XML Security Library
- xrdb
- Vino
- OProfile
- syslog-ng
- sFlow Toolkit
- GNOME Display Manager
- libsoup
- CA Certificates
- Gitolite
- QtCreator
- Racer
Impact
A context-dependent attacker may be able to gain escalated privileges, execute arbitrary code, cause Denial of Service, obtain sensitive information, or otherwise bypass security restrictions.
Workaround
There are no known workarounds at this time.
Resolution
All FMOD Studio users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/fmod-4.38.00"
All PEAR Mail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-php/PEAR-Mail-1.2.0"
All LVM2 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-fs/lvm2-2.02.72"
All GnuCash users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/gnucash-2.4.4"
All xine-lib users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.19"
All Last.fm Scrobbler users should upgrade to the latest version:
# emerge --sync # emerge -a --oneshot -v ">=media-sound/lastfmplayer-1.5.4.26862-r3"
All WebKitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-1.2.7"
All shadow tool suite users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.1.4.3"
All PEAR users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-php/PEAR-PEAR-1.9.2-r1"
All unixODBC users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/unixODBC-2.3.0-r1"
All Resource Agents users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=sys-cluster/resource-agents-1.0.4-r1"
All mrouted users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mrouted-3.9.5"
All rsync users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/rsync-3.0.8"
All XML Security Library users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/xmlsec-1.2.17"
All xrdb users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-apps/xrdb-1.0.9"
All Vino users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/vino-2.32.2"
All OProfile users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/oprofile-0.9.6-r1"
All syslog-ng users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-3.2.4"
All sFlow Toolkit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/sflowtool-3.20"
All GNOME Display Manager users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=gnome-base/gdm-3.8.4-r3"
All libsoup users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/libsoup-2.34.3"
All CA Certificates users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-misc/ca-certificates-20110502-r1"
All Gitolite users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/gitolite-1.5.9.1"
All QtCreator users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-util/qt-creator-2.1.0"
Gentoo has discontinued support for Racer. We recommend that users unmerge Racer:
# emerge --unmerge "games-sports/racer-bin"
NOTE: This is a legacy GLSA. Updates for all affected architectures have been available since 2012. It is likely that your system is already no longer affected by these issues.
References
[ 1 ] CVE-2007-4370 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370 [ 2 ] CVE-2009-4023 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023 [ 3 ] CVE-2009-4111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111 [ 4 ] CVE-2010-0778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778 [ 5 ] CVE-2010-1780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780 [ 6 ] CVE-2010-1782 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782 [ 7 ] CVE-2010-1783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783 [ 8 ] CVE-2010-1784 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784 [ 9 ] CVE-2010-1785 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785 [ 10 ] CVE-2010-1786 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786 [ 11 ] CVE-2010-1787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787 [ 12 ] CVE-2010-1788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788 [ 13 ] CVE-2010-1790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790 [ 14 ] CVE-2010-1791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791 [ 15 ] CVE-2010-1792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792 [ 16 ] CVE-2010-1793 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793 [ 17 ] CVE-2010-1807 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807 [ 18 ] CVE-2010-1812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812 [ 19 ] CVE-2010-1814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814 [ 20 ] CVE-2010-1815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815 [ 21 ] CVE-2010-2526 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526 [ 22 ] CVE-2010-2901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901 [ 23 ] CVE-2010-3255 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255 [ 24 ] CVE-2010-3257 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257 [ 25 ] CVE-2010-3259 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259 [ 26 ] CVE-2010-3362 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362 [ 27 ] CVE-2010-3374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374 [ 28 ] CVE-2010-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389 [ 29 ] CVE-2010-3812 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812 [ 30 ] CVE-2010-3813 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813 [ 31 ] CVE-2010-3999 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999 [ 32 ] CVE-2010-4042 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042 [ 33 ] CVE-2010-4197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197 [ 34 ] CVE-2010-4198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198 [ 35 ] CVE-2010-4204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204 [ 36 ] CVE-2010-4206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206 [ 37 ] CVE-2010-4492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492 [ 38 ] CVE-2010-4493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493 [ 39 ] CVE-2010-4577 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577 [ 40 ] CVE-2010-4578 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578 [ 41 ] CVE-2011-0007 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007 [ 42 ] CVE-2011-0465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465 [ 43 ] CVE-2011-0482 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482 [ 44 ] CVE-2011-0721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721 [ 45 ] CVE-2011-0727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727 [ 46 ] CVE-2011-0904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904 [ 47 ] CVE-2011-0905 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905 [ 48 ] CVE-2011-1072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072 [ 49 ] CVE-2011-1097 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097 [ 50 ] CVE-2011-1144 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144 [ 51 ] CVE-2011-1425 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425 [ 52 ] CVE-2011-1572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572 [ 53 ] CVE-2011-1760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760 [ 54 ] CVE-2011-1951 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951 [ 55 ] CVE-2011-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471 [ 56 ] CVE-2011-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472 [ 57 ] CVE-2011-2473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473 [ 58 ] CVE-2011-2524 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524 [ 59 ] CVE-2011-3365 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365 [ 60 ] CVE-2011-3366 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366 [ 61 ] CVE-2011-3367 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-09.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425
Updated Packages:
Mandriva Linux 2009.0: ab2caef2b723f8a627f4682e9b9b295c 2009.0/i586/libxmlsec1-1-1.2.10-7.3mdv2009.0.i586.rpm a82fe9a2eb07213a40d5b062d0c5a230 2009.0/i586/libxmlsec1-devel-1.2.10-7.3mdv2009.0.i586.rpm 2cec5cb556b742bcc87d10a14ded022c 2009.0/i586/libxmlsec1-gnutls1-1.2.10-7.3mdv2009.0.i586.rpm 7169d872a13bb5da168cad113ca3c9cb 2009.0/i586/libxmlsec1-gnutls-devel-1.2.10-7.3mdv2009.0.i586.rpm d9c9fe192a991bb7937fce742acac213 2009.0/i586/libxmlsec1-nss1-1.2.10-7.3mdv2009.0.i586.rpm c412b1cf110d47b6c9848a2718394e83 2009.0/i586/libxmlsec1-nss-devel-1.2.10-7.3mdv2009.0.i586.rpm fb3fcd72027a0c4707d185c03d7e6ffe 2009.0/i586/libxmlsec1-openssl1-1.2.10-7.3mdv2009.0.i586.rpm ee2375b5ce6b80fb0a37f8a298df8ffc 2009.0/i586/libxmlsec1-openssl-devel-1.2.10-7.3mdv2009.0.i586.rpm 45ec8c67b589d6874c265c316f0ef715 2009.0/i586/xmlsec1-1.2.10-7.3mdv2009.0.i586.rpm 00a18a237c5aee09d3de790df4ee8d0b 2009.0/SRPMS/xmlsec1-1.2.10-7.3mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: ab200f5369469e19e89743b23a097764 2009.0/x86_64/lib64xmlsec1-1-1.2.10-7.3mdv2009.0.x86_64.rpm 15eb2c4424a6d91b68f5caef8db2fdff 2009.0/x86_64/lib64xmlsec1-devel-1.2.10-7.3mdv2009.0.x86_64.rpm ad73f2e06650f4b76b482a1bf7532eac 2009.0/x86_64/lib64xmlsec1-gnutls1-1.2.10-7.3mdv2009.0.x86_64.rpm 7c60997091a4214148c77d2d14c01a94 2009.0/x86_64/lib64xmlsec1-gnutls-devel-1.2.10-7.3mdv2009.0.x86_64.rpm 22ac198274c38732b3f0a65e5814ffc7 2009.0/x86_64/lib64xmlsec1-nss1-1.2.10-7.3mdv2009.0.x86_64.rpm ddb61026f298b57254192f25398498d6 2009.0/x86_64/lib64xmlsec1-nss-devel-1.2.10-7.3mdv2009.0.x86_64.rpm a965cb539117930426efb7b6dbf8553d 2009.0/x86_64/lib64xmlsec1-openssl1-1.2.10-7.3mdv2009.0.x86_64.rpm a2853268d49f512f660b0c85f32f3b98 2009.0/x86_64/lib64xmlsec1-openssl-devel-1.2.10-7.3mdv2009.0.x86_64.rpm cfcb56269c2b2e79ea2701839fa93090 2009.0/x86_64/xmlsec1-1.2.10-7.3mdv2009.0.x86_64.rpm 00a18a237c5aee09d3de790df4ee8d0b 2009.0/SRPMS/xmlsec1-1.2.10-7.3mdv2009.0.src.rpm
Mandriva Linux 2010.0: bdc91e075985a73525da8a27c50f3e4d 2010.0/i586/libxmlsec1-1-1.2.13-1.2mdv2010.0.i586.rpm a8cf6ac42e0ae7df962f3b6e1abd0a27 2010.0/i586/libxmlsec1-devel-1.2.13-1.2mdv2010.0.i586.rpm 50e1f9b8c2b36781b5597c37756f0a27 2010.0/i586/libxmlsec1-gnutls1-1.2.13-1.2mdv2010.0.i586.rpm 94b518a20f8d6a99033be5c7fa9a561c 2010.0/i586/libxmlsec1-gnutls-devel-1.2.13-1.2mdv2010.0.i586.rpm b5e93f5674d8b2065e64f2e53ba05605 2010.0/i586/libxmlsec1-nss1-1.2.13-1.2mdv2010.0.i586.rpm 880fe166f23413733c3c3c118d816387 2010.0/i586/libxmlsec1-nss-devel-1.2.13-1.2mdv2010.0.i586.rpm 21b46e66c6b78df3fbcd86064cf30e7c 2010.0/i586/libxmlsec1-openssl1-1.2.13-1.2mdv2010.0.i586.rpm 6620368f5cc3bcbb857b4a23eac3c8ca 2010.0/i586/libxmlsec1-openssl-devel-1.2.13-1.2mdv2010.0.i586.rpm c2ea73966298d29fdfdc34c7c2a2f1c2 2010.0/i586/xmlsec1-1.2.13-1.2mdv2010.0.i586.rpm 877a15d6552bedb5763df240f4d82d84 2010.0/SRPMS/xmlsec1-1.2.13-1.2mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64: a62d421d4fd1899fbba01309dbaf1896 2010.0/x86_64/lib64xmlsec1-1-1.2.13-1.2mdv2010.0.x86_64.rpm 2f537e7a96421519da35174c233ce595 2010.0/x86_64/lib64xmlsec1-devel-1.2.13-1.2mdv2010.0.x86_64.rpm 7a8b160fe2e6034be36f6eae79085ace 2010.0/x86_64/lib64xmlsec1-gnutls1-1.2.13-1.2mdv2010.0.x86_64.rpm 0a6294fd609fc0852648a497a88483c0 2010.0/x86_64/lib64xmlsec1-gnutls-devel-1.2.13-1.2mdv2010.0.x86_64.rpm 29db3a07cccce7ad181397aad0cc8d0d 2010.0/x86_64/lib64xmlsec1-nss1-1.2.13-1.2mdv2010.0.x86_64.rpm fbbf15dc907548874aa56a0a60288c44 2010.0/x86_64/lib64xmlsec1-nss-devel-1.2.13-1.2mdv2010.0.x86_64.rpm 91cde9b85b74ee50ca22063395776ad5 2010.0/x86_64/lib64xmlsec1-openssl1-1.2.13-1.2mdv2010.0.x86_64.rpm 48200b7dbaf54a0f3b773fe838bba047 2010.0/x86_64/lib64xmlsec1-openssl-devel-1.2.13-1.2mdv2010.0.x86_64.rpm 959b3952c7246d48878bd70d51966a8e 2010.0/x86_64/xmlsec1-1.2.13-1.2mdv2010.0.x86_64.rpm 877a15d6552bedb5763df240f4d82d84 2010.0/SRPMS/xmlsec1-1.2.13-1.2mdv2010.0.src.rpm
Mandriva Enterprise Server 5: 319b4ab924dbbbf82f4614d148f14804 mes5/i586/libxmlsec1-1-1.2.10-7.3mdvmes5.2.i586.rpm 9278a1efe02a044e5ff7a1a37ffa36d4 mes5/i586/libxmlsec1-devel-1.2.10-7.3mdvmes5.2.i586.rpm cb993560c51e070393b7e2e0861900ff mes5/i586/libxmlsec1-gnutls1-1.2.10-7.3mdvmes5.2.i586.rpm 293f8773291935a45d76908db7825384 mes5/i586/libxmlsec1-gnutls-devel-1.2.10-7.3mdvmes5.2.i586.rpm aab3eb1ab4455876a2339e9863fa7935 mes5/i586/libxmlsec1-nss1-1.2.10-7.3mdvmes5.2.i586.rpm 2ff66c74e00e7dd79d6037162dde87b8 mes5/i586/libxmlsec1-nss-devel-1.2.10-7.3mdvmes5.2.i586.rpm f2f5866fd188473eb74e33c5b78c2d9a mes5/i586/libxmlsec1-openssl1-1.2.10-7.3mdvmes5.2.i586.rpm c41b9570228f06d39b91d87a8538728c mes5/i586/libxmlsec1-openssl-devel-1.2.10-7.3mdvmes5.2.i586.rpm 308bc571cc766753f0c07a44ca80181c mes5/i586/xmlsec1-1.2.10-7.3mdvmes5.2.i586.rpm d07141a9abde87df9f330093acd2d59f mes5/SRPMS/xmlsec1-1.2.10-7.3mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: 327e47c32620609fd4245c32475938c7 mes5/x86_64/lib64xmlsec1-1-1.2.10-7.3mdvmes5.2.x86_64.rpm 033b408efc5436eb5d6e09a9582760a5 mes5/x86_64/lib64xmlsec1-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm 814d8c33a387f72d855f7bfc250f74e3 mes5/x86_64/lib64xmlsec1-gnutls1-1.2.10-7.3mdvmes5.2.x86_64.rpm 2883ed21f25132b542780bd1dfccfb17 mes5/x86_64/lib64xmlsec1-gnutls-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm 3409c185fdbcb57c45a1883752ade7c3 mes5/x86_64/lib64xmlsec1-nss1-1.2.10-7.3mdvmes5.2.x86_64.rpm f781e2d050e0c19945c783dc86745e08 mes5/x86_64/lib64xmlsec1-nss-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm cc9fc7fcd1d32d4877689486e424875e mes5/x86_64/lib64xmlsec1-openssl1-1.2.10-7.3mdvmes5.2.x86_64.rpm a5315ce478dda5fd0af55a1acf043288 mes5/x86_64/lib64xmlsec1-openssl-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm 1a153d8d6af32724260f029205cd0a54 mes5/x86_64/xmlsec1-1.2.10-7.3mdvmes5.2.x86_64.rpm d07141a9abde87df9f330093acd2d59f mes5/SRPMS/xmlsec1-1.2.10-7.3mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFNmXaUmqjQ0CJFipgRAgs3AKCLIc162L+edW3LKFOx7G/U4GkynwCgpJ7j SEMdD/0Sj9XbDDepzFsOW3o= =Kuyv -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0096", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.1" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.0.2" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.11" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.9" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.13" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.2a" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.14" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.6" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.7" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.0.3" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.8" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.1.1" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.4" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.0.4" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.10" }, { "model": "xml security library", "scope": "lte", "trust": 1.0, "vendor": "aleksey", "version": "1.2.16" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.9" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.2" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.6" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.3" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.1.2" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.15" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.3" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.4" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.8" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.1" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.15" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.5" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.14" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.2" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.5" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.7" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.1.0" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.0" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.13" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.1.0" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.0.1" }, { "model": "webkit", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.12" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.2.10" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "0.0.11" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.1.1" }, { "model": "xml security library", "scope": "eq", "trust": 1.0, "vendor": "aleksey", "version": "1.0.0" }, { "model": "xml security library", "scope": "lt", "trust": 0.8, "vendor": "aleksey", "version": "1.2.17" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.6.z (server)" }, { "model": "enterprise linux long life", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "(v. 5.6 server)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "webkit", "scope": null, "trust": 0.6, "vendor": "apple", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20110" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "message networking sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "ip deskphone", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "96x16" }, { "model": "sanin xml security library", "scope": "eq", "trust": 0.3, "vendor": "aleksey", "version": "1.2.16" }, { "model": "sanin xml security library", "scope": "ne", "trust": 0.3, "vendor": "aleksey", "version": "1.2.17" } ], "sources": [ { "db": "BID", "id": "47135" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "CNNVD", "id": "CNNVD-201104-019" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:aleksey:xml_security_library", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_long_life", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001622" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reported by the vendor", "sources": [ { "db": "BID", "id": "47135" } ], "trust": 0.3 }, "cve": "CVE-2011-1425", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2011-1425", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-49370", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-1425", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-1425", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201104-019", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-49370", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-49370" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "CNNVD", "id": "CNNVD-201104-019" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification. \nRemote attackers can exploit this issue to read or write to arbitrary XML files. This may lead to further attacks. \nVersions prior to XML Security Library 1.2.17 are vulnerable. \n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 1.2.9-5+lenny1. \n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 1.2.14-1+squeeze1. \n\nFor the testing distribution (wheezy) and unstable distribution (sid),\nthis problem has been fixed in version 1.2.14-1.1. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. This fixes a vulnerability,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nFor more information:\nSA43920\n\nSOLUTION:\nApply updated packages via the apt-get package manager. ----------------------------------------------------------------------\n\n\nSecunia Research and vulnerability disclosures coordinated by Secunia:\n\nhttp://secunia.com/research/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nXML Security Library XSLT File Access Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43920\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43920/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43920\n\nRELEASE DATE:\n2011-04-02\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43920/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43920/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43920\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in the XML Security Library, which\ncan be exploited by malicious people to compromise a vulnerable\nsystem. \n\nSOLUTION:\nUpdate to version 1.2.17. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Nicolas Gregoire. \n\nORIGINAL ADVISORY:\nhttp://www.aleksey.com/pipermail/xmlsec/2011/009120.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201412-09\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Multiple packages, Multiple vulnerabilities fixed in 2011\n Date: December 11, 2014\n Bugs: #194151, #294253, #294256, #334087, #344059, #346897,\n #350598, #352608, #354209, #355207, #356893, #358611,\n #358785, #358789, #360891, #361397, #362185, #366697,\n #366699, #369069, #370839, #372971, #376793, #381169,\n #386321, #386361\n ID: 201412-09\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nThis GLSA contains notification of vulnerabilities found in several\nGentoo packages which have been fixed prior to January 1, 2012. The\nworst of these vulnerabilities could lead to local privilege escalation\nand remote code execution. Please see the package list and CVE\nidentifiers below for more information. \n\nBackground\n==========\n\nFor more information on the packages listed in this GLSA, please see\ntheir homepage referenced in the ebuild. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 games-sports/racer-bin \u003e= 0.5.0-r1 Vulnerable!\n 2 media-libs/fmod \u003c 4.38.00 \u003e= 4.38.00\n 3 dev-php/PEAR-Mail \u003c 1.2.0 \u003e= 1.2.0\n 4 sys-fs/lvm2 \u003c 2.02.72 \u003e= 2.02.72\n 5 app-office/gnucash \u003c 2.4.4 \u003e= 2.4.4\n 6 media-libs/xine-lib \u003c 1.1.19 \u003e= 1.1.19\n 7 media-sound/lastfmplayer\n \u003c 1.5.4.26862-r3 \u003e= 1.5.4.26862-r3\n 8 net-libs/webkit-gtk \u003c 1.2.7 \u003e= 1.2.7\n 9 sys-apps/shadow \u003c 4.1.4.3 \u003e= 4.1.4.3\n 10 dev-php/PEAR-PEAR \u003c 1.9.2-r1 \u003e= 1.9.2-r1\n 11 dev-db/unixODBC \u003c 2.3.0-r1 \u003e= 2.3.0-r1\n 12 sys-cluster/resource-agents\n \u003c 1.0.4-r1 \u003e= 1.0.4-r1\n 13 net-misc/mrouted \u003c 3.9.5 \u003e= 3.9.5\n 14 net-misc/rsync \u003c 3.0.8 \u003e= 3.0.8\n 15 dev-libs/xmlsec \u003c 1.2.17 \u003e= 1.2.17\n 16 x11-apps/xrdb \u003c 1.0.9 \u003e= 1.0.9\n 17 net-misc/vino \u003c 2.32.2 \u003e= 2.32.2\n 18 dev-util/oprofile \u003c 0.9.6-r1 \u003e= 0.9.6-r1\n 19 app-admin/syslog-ng \u003c 3.2.4 \u003e= 3.2.4\n 20 net-analyzer/sflowtool \u003c 3.20 \u003e= 3.20\n 21 gnome-base/gdm \u003c 3.8.4-r3 \u003e= 3.8.4-r3\n 22 net-libs/libsoup \u003c 2.34.3 \u003e= 2.34.3\n 23 app-misc/ca-certificates\n \u003c 20110502-r1 \u003e= 20110502-r1\n 24 dev-vcs/gitolite \u003c 1.5.9.1 \u003e= 1.5.9.1\n 25 dev-util/qt-creator \u003c 2.1.0 \u003e= 2.1.0\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. \n -------------------------------------------------------------------\n 25 affected packages\n\nDescription\n===========\n\nVulnerabilities have been discovered in the packages listed below. \nPlease review the CVE identifiers in the Reference section for details. \n\n* FMOD Studio\n* PEAR Mail\n* LVM2\n* GnuCash\n* xine-lib\n* Last.fm Scrobbler\n* WebKitGTK+\n* shadow tool suite\n* PEAR\n* unixODBC\n* Resource Agents\n* mrouted\n* rsync\n* XML Security Library\n* xrdb\n* Vino\n* OProfile\n* syslog-ng\n* sFlow Toolkit\n* GNOME Display Manager\n* libsoup\n* CA Certificates\n* Gitolite\n* QtCreator\n* Racer\n\nImpact\n======\n\nA context-dependent attacker may be able to gain escalated privileges,\nexecute arbitrary code, cause Denial of Service, obtain sensitive\ninformation, or otherwise bypass security restrictions. \n\nWorkaround\n==========\n\nThere are no known workarounds at this time. \n\nResolution\n==========\n\nAll FMOD Studio users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=media-libs/fmod-4.38.00\"\n\nAll PEAR Mail users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-php/PEAR-Mail-1.2.0\"\n\nAll LVM2 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=sys-fs/lvm2-2.02.72\"\n\nAll GnuCash users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-office/gnucash-2.4.4\"\n\nAll xine-lib users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=media-libs/xine-lib-1.1.19\"\n\nAll Last.fm Scrobbler users should upgrade to the latest version:\n\n # emerge --sync\n # emerge -a --oneshot -v \"\u003e=media-sound/lastfmplayer-1.5.4.26862-r3\"\n\nAll WebKitGTK+ users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/webkit-gtk-1.2.7\"\n\nAll shadow tool suite users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=sys-apps/shadow-4.1.4.3\"\n\nAll PEAR users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-php/PEAR-PEAR-1.9.2-r1\"\n\nAll unixODBC users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-db/unixODBC-2.3.0-r1\"\n\nAll Resource Agents users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=sys-cluster/resource-agents-1.0.4-r1\"\n\nAll mrouted users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/mrouted-3.9.5\"\n\nAll rsync users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/rsync-3.0.8\"\n\nAll XML Security Library users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/xmlsec-1.2.17\"\n\nAll xrdb users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=x11-apps/xrdb-1.0.9\"\n\nAll Vino users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/vino-2.32.2\"\n\nAll OProfile users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-util/oprofile-0.9.6-r1\"\n\nAll syslog-ng users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-admin/syslog-ng-3.2.4\"\n\nAll sFlow Toolkit users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/sflowtool-3.20\"\n\nAll GNOME Display Manager users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=gnome-base/gdm-3.8.4-r3\"\n\nAll libsoup users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/libsoup-2.34.3\"\n\nAll CA Certificates users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-misc/ca-certificates-20110502-r1\"\n\nAll Gitolite users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-vcs/gitolite-1.5.9.1\"\n\nAll QtCreator users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-util/qt-creator-2.1.0\"\n\nGentoo has discontinued support for Racer. We recommend that users\nunmerge Racer:\n\n # emerge --unmerge \"games-sports/racer-bin\"\n\nNOTE: This is a legacy GLSA. Updates for all affected architectures\nhave been available since 2012. It is likely that your system is\nalready no longer affected by these issues. \n\nReferences\n==========\n\n[ 1 ] CVE-2007-4370\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4370\n[ 2 ] CVE-2009-4023\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4023\n[ 3 ] CVE-2009-4111\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4111\n[ 4 ] CVE-2010-0778\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0778\n[ 5 ] CVE-2010-1780\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1780\n[ 6 ] CVE-2010-1782\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1782\n[ 7 ] CVE-2010-1783\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1783\n[ 8 ] CVE-2010-1784\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1784\n[ 9 ] CVE-2010-1785\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1785\n[ 10 ] CVE-2010-1786\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1786\n[ 11 ] CVE-2010-1787\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1787\n[ 12 ] CVE-2010-1788\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1788\n[ 13 ] CVE-2010-1790\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1790\n[ 14 ] CVE-2010-1791\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1791\n[ 15 ] CVE-2010-1792\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1792\n[ 16 ] CVE-2010-1793\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1793\n[ 17 ] CVE-2010-1807\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1807\n[ 18 ] CVE-2010-1812\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1812\n[ 19 ] CVE-2010-1814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1814\n[ 20 ] CVE-2010-1815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1815\n[ 21 ] CVE-2010-2526\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2526\n[ 22 ] CVE-2010-2901\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2901\n[ 23 ] CVE-2010-3255\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3255\n[ 24 ] CVE-2010-3257\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3257\n[ 25 ] CVE-2010-3259\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3259\n[ 26 ] CVE-2010-3362\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3362\n[ 27 ] CVE-2010-3374\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3374\n[ 28 ] CVE-2010-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3389\n[ 29 ] CVE-2010-3812\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3812\n[ 30 ] CVE-2010-3813\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3813\n[ 31 ] CVE-2010-3999\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3999\n[ 32 ] CVE-2010-4042\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4042\n[ 33 ] CVE-2010-4197\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4197\n[ 34 ] CVE-2010-4198\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4198\n[ 35 ] CVE-2010-4204\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4204\n[ 36 ] CVE-2010-4206\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4206\n[ 37 ] CVE-2010-4492\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4492\n[ 38 ] CVE-2010-4493\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4493\n[ 39 ] CVE-2010-4577\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4577\n[ 40 ] CVE-2010-4578\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4578\n[ 41 ] CVE-2011-0007\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0007\n[ 42 ] CVE-2011-0465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0465\n[ 43 ] CVE-2011-0482\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0482\n[ 44 ] CVE-2011-0721\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0721\n[ 45 ] CVE-2011-0727\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0727\n[ 46 ] CVE-2011-0904\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0904\n[ 47 ] CVE-2011-0905\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0905\n[ 48 ] CVE-2011-1072\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1072\n[ 49 ] CVE-2011-1097\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1097\n[ 50 ] CVE-2011-1144\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1144\n[ 51 ] CVE-2011-1425\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1425\n[ 52 ] CVE-2011-1572\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1572\n[ 53 ] CVE-2011-1760\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1760\n[ 54 ] CVE-2011-1951\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1951\n[ 55 ] CVE-2011-2471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2471\n[ 56 ] CVE-2011-2472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2472\n[ 57 ] CVE-2011-2473\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2473\n[ 58 ] CVE-2011-2524\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2524\n[ 59 ] CVE-2011-3365\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3365\n[ 60 ] CVE-2011-3366\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3366\n[ 61 ] CVE-2011-3367\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3367\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-09.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149\u0026amp;products_id=490\n \n The updated packages have been patched to correct this issue. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1425\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2009.0:\n ab2caef2b723f8a627f4682e9b9b295c 2009.0/i586/libxmlsec1-1-1.2.10-7.3mdv2009.0.i586.rpm\n a82fe9a2eb07213a40d5b062d0c5a230 2009.0/i586/libxmlsec1-devel-1.2.10-7.3mdv2009.0.i586.rpm\n 2cec5cb556b742bcc87d10a14ded022c 2009.0/i586/libxmlsec1-gnutls1-1.2.10-7.3mdv2009.0.i586.rpm\n 7169d872a13bb5da168cad113ca3c9cb 2009.0/i586/libxmlsec1-gnutls-devel-1.2.10-7.3mdv2009.0.i586.rpm\n d9c9fe192a991bb7937fce742acac213 2009.0/i586/libxmlsec1-nss1-1.2.10-7.3mdv2009.0.i586.rpm\n c412b1cf110d47b6c9848a2718394e83 2009.0/i586/libxmlsec1-nss-devel-1.2.10-7.3mdv2009.0.i586.rpm\n fb3fcd72027a0c4707d185c03d7e6ffe 2009.0/i586/libxmlsec1-openssl1-1.2.10-7.3mdv2009.0.i586.rpm\n ee2375b5ce6b80fb0a37f8a298df8ffc 2009.0/i586/libxmlsec1-openssl-devel-1.2.10-7.3mdv2009.0.i586.rpm\n 45ec8c67b589d6874c265c316f0ef715 2009.0/i586/xmlsec1-1.2.10-7.3mdv2009.0.i586.rpm \n 00a18a237c5aee09d3de790df4ee8d0b 2009.0/SRPMS/xmlsec1-1.2.10-7.3mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n ab200f5369469e19e89743b23a097764 2009.0/x86_64/lib64xmlsec1-1-1.2.10-7.3mdv2009.0.x86_64.rpm\n 15eb2c4424a6d91b68f5caef8db2fdff 2009.0/x86_64/lib64xmlsec1-devel-1.2.10-7.3mdv2009.0.x86_64.rpm\n ad73f2e06650f4b76b482a1bf7532eac 2009.0/x86_64/lib64xmlsec1-gnutls1-1.2.10-7.3mdv2009.0.x86_64.rpm\n 7c60997091a4214148c77d2d14c01a94 2009.0/x86_64/lib64xmlsec1-gnutls-devel-1.2.10-7.3mdv2009.0.x86_64.rpm\n 22ac198274c38732b3f0a65e5814ffc7 2009.0/x86_64/lib64xmlsec1-nss1-1.2.10-7.3mdv2009.0.x86_64.rpm\n ddb61026f298b57254192f25398498d6 2009.0/x86_64/lib64xmlsec1-nss-devel-1.2.10-7.3mdv2009.0.x86_64.rpm\n a965cb539117930426efb7b6dbf8553d 2009.0/x86_64/lib64xmlsec1-openssl1-1.2.10-7.3mdv2009.0.x86_64.rpm\n a2853268d49f512f660b0c85f32f3b98 2009.0/x86_64/lib64xmlsec1-openssl-devel-1.2.10-7.3mdv2009.0.x86_64.rpm\n cfcb56269c2b2e79ea2701839fa93090 2009.0/x86_64/xmlsec1-1.2.10-7.3mdv2009.0.x86_64.rpm \n 00a18a237c5aee09d3de790df4ee8d0b 2009.0/SRPMS/xmlsec1-1.2.10-7.3mdv2009.0.src.rpm\n\n Mandriva Linux 2010.0:\n bdc91e075985a73525da8a27c50f3e4d 2010.0/i586/libxmlsec1-1-1.2.13-1.2mdv2010.0.i586.rpm\n a8cf6ac42e0ae7df962f3b6e1abd0a27 2010.0/i586/libxmlsec1-devel-1.2.13-1.2mdv2010.0.i586.rpm\n 50e1f9b8c2b36781b5597c37756f0a27 2010.0/i586/libxmlsec1-gnutls1-1.2.13-1.2mdv2010.0.i586.rpm\n 94b518a20f8d6a99033be5c7fa9a561c 2010.0/i586/libxmlsec1-gnutls-devel-1.2.13-1.2mdv2010.0.i586.rpm\n b5e93f5674d8b2065e64f2e53ba05605 2010.0/i586/libxmlsec1-nss1-1.2.13-1.2mdv2010.0.i586.rpm\n 880fe166f23413733c3c3c118d816387 2010.0/i586/libxmlsec1-nss-devel-1.2.13-1.2mdv2010.0.i586.rpm\n 21b46e66c6b78df3fbcd86064cf30e7c 2010.0/i586/libxmlsec1-openssl1-1.2.13-1.2mdv2010.0.i586.rpm\n 6620368f5cc3bcbb857b4a23eac3c8ca 2010.0/i586/libxmlsec1-openssl-devel-1.2.13-1.2mdv2010.0.i586.rpm\n c2ea73966298d29fdfdc34c7c2a2f1c2 2010.0/i586/xmlsec1-1.2.13-1.2mdv2010.0.i586.rpm \n 877a15d6552bedb5763df240f4d82d84 2010.0/SRPMS/xmlsec1-1.2.13-1.2mdv2010.0.src.rpm\n\n Mandriva Linux 2010.0/X86_64:\n a62d421d4fd1899fbba01309dbaf1896 2010.0/x86_64/lib64xmlsec1-1-1.2.13-1.2mdv2010.0.x86_64.rpm\n 2f537e7a96421519da35174c233ce595 2010.0/x86_64/lib64xmlsec1-devel-1.2.13-1.2mdv2010.0.x86_64.rpm\n 7a8b160fe2e6034be36f6eae79085ace 2010.0/x86_64/lib64xmlsec1-gnutls1-1.2.13-1.2mdv2010.0.x86_64.rpm\n 0a6294fd609fc0852648a497a88483c0 2010.0/x86_64/lib64xmlsec1-gnutls-devel-1.2.13-1.2mdv2010.0.x86_64.rpm\n 29db3a07cccce7ad181397aad0cc8d0d 2010.0/x86_64/lib64xmlsec1-nss1-1.2.13-1.2mdv2010.0.x86_64.rpm\n fbbf15dc907548874aa56a0a60288c44 2010.0/x86_64/lib64xmlsec1-nss-devel-1.2.13-1.2mdv2010.0.x86_64.rpm\n 91cde9b85b74ee50ca22063395776ad5 2010.0/x86_64/lib64xmlsec1-openssl1-1.2.13-1.2mdv2010.0.x86_64.rpm\n 48200b7dbaf54a0f3b773fe838bba047 2010.0/x86_64/lib64xmlsec1-openssl-devel-1.2.13-1.2mdv2010.0.x86_64.rpm\n 959b3952c7246d48878bd70d51966a8e 2010.0/x86_64/xmlsec1-1.2.13-1.2mdv2010.0.x86_64.rpm \n 877a15d6552bedb5763df240f4d82d84 2010.0/SRPMS/xmlsec1-1.2.13-1.2mdv2010.0.src.rpm\n\n Mandriva Enterprise Server 5:\n 319b4ab924dbbbf82f4614d148f14804 mes5/i586/libxmlsec1-1-1.2.10-7.3mdvmes5.2.i586.rpm\n 9278a1efe02a044e5ff7a1a37ffa36d4 mes5/i586/libxmlsec1-devel-1.2.10-7.3mdvmes5.2.i586.rpm\n cb993560c51e070393b7e2e0861900ff mes5/i586/libxmlsec1-gnutls1-1.2.10-7.3mdvmes5.2.i586.rpm\n 293f8773291935a45d76908db7825384 mes5/i586/libxmlsec1-gnutls-devel-1.2.10-7.3mdvmes5.2.i586.rpm\n aab3eb1ab4455876a2339e9863fa7935 mes5/i586/libxmlsec1-nss1-1.2.10-7.3mdvmes5.2.i586.rpm\n 2ff66c74e00e7dd79d6037162dde87b8 mes5/i586/libxmlsec1-nss-devel-1.2.10-7.3mdvmes5.2.i586.rpm\n f2f5866fd188473eb74e33c5b78c2d9a mes5/i586/libxmlsec1-openssl1-1.2.10-7.3mdvmes5.2.i586.rpm\n c41b9570228f06d39b91d87a8538728c mes5/i586/libxmlsec1-openssl-devel-1.2.10-7.3mdvmes5.2.i586.rpm\n 308bc571cc766753f0c07a44ca80181c mes5/i586/xmlsec1-1.2.10-7.3mdvmes5.2.i586.rpm \n d07141a9abde87df9f330093acd2d59f mes5/SRPMS/xmlsec1-1.2.10-7.3mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 327e47c32620609fd4245c32475938c7 mes5/x86_64/lib64xmlsec1-1-1.2.10-7.3mdvmes5.2.x86_64.rpm\n 033b408efc5436eb5d6e09a9582760a5 mes5/x86_64/lib64xmlsec1-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm\n 814d8c33a387f72d855f7bfc250f74e3 mes5/x86_64/lib64xmlsec1-gnutls1-1.2.10-7.3mdvmes5.2.x86_64.rpm\n 2883ed21f25132b542780bd1dfccfb17 mes5/x86_64/lib64xmlsec1-gnutls-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm\n 3409c185fdbcb57c45a1883752ade7c3 mes5/x86_64/lib64xmlsec1-nss1-1.2.10-7.3mdvmes5.2.x86_64.rpm\n f781e2d050e0c19945c783dc86745e08 mes5/x86_64/lib64xmlsec1-nss-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm\n cc9fc7fcd1d32d4877689486e424875e mes5/x86_64/lib64xmlsec1-openssl1-1.2.10-7.3mdvmes5.2.x86_64.rpm\n a5315ce478dda5fd0af55a1acf043288 mes5/x86_64/lib64xmlsec1-openssl-devel-1.2.10-7.3mdvmes5.2.x86_64.rpm\n 1a153d8d6af32724260f029205cd0a54 mes5/x86_64/xmlsec1-1.2.10-7.3mdvmes5.2.x86_64.rpm \n d07141a9abde87df9f330093acd2d59f mes5/SRPMS/xmlsec1-1.2.10-7.3mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFNmXaUmqjQ0CJFipgRAgs3AKCLIc162L+edW3LKFOx7G/U4GkynwCgpJ7j\nSEMdD/0Sj9XbDDepzFsOW3o=\n=Kuyv\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2011-1425" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "BID", "id": "47135" }, { "db": "VULHUB", "id": "VHN-49370" }, { "db": "PACKETSTORM", "id": "100561" }, { "db": "PACKETSTORM", "id": "101158" }, { "db": "PACKETSTORM", "id": "100587" }, { "db": "PACKETSTORM", "id": "99973" }, { "db": "PACKETSTORM", "id": "129522" }, { "db": "PACKETSTORM", "id": "100044" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-49370", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-49370" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-1425", "trust": 3.1 }, { "db": "BID", "id": "47135", "trust": 2.2 }, { "db": "SECUNIA", "id": "43920", "trust": 1.8 }, { "db": "SECUNIA", "id": "44167", "trust": 1.2 }, { "db": "SECUNIA", "id": "44423", "trust": 1.2 }, { "db": "VUPEN", "id": "ADV-2011-0855", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-1172", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0858", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-1010", "trust": 1.1 }, { "db": "SECTRACK", "id": "1025284", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2011-001622", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201104-019", "trust": 0.7 }, { "db": "MLIST", "id": "[XMLSEC] 20110331 NEW XMLSEC 1.2.17 RELEASE", "trust": 0.6 }, { "db": "NSFOCUS", "id": "16803", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "100561", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "100044", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "17993", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-72233", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-49370", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101158", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100587", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "99973", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-49370" }, { "db": "BID", "id": "47135" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "PACKETSTORM", "id": "100561" }, { "db": "PACKETSTORM", "id": "101158" }, { "db": "PACKETSTORM", "id": "100587" }, { "db": "PACKETSTORM", "id": "99973" }, { "db": "PACKETSTORM", "id": "129522" }, { "db": "PACKETSTORM", "id": "100044" }, { "db": "CNNVD", "id": "CNNVD-201104-019" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "id": "VAR-201104-0096", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-49370" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:09:49.850000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2011:0486", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2011-0486.html" }, { "title": "Download_The latest stable XML Security Library version is 1.2.18", "trust": 0.8, "url": "http://www.aleksey.com/xmlsec/download.html" }, { "title": "New xmlsec 1.2.17 release", "trust": 0.8, "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001622" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-49370" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.aleksey.com/pipermail/xmlsec/2011/009120.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/47135" }, { "trust": 1.7, "url": "http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780" }, { "trust": 1.7, "url": "http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa" }, { "trust": 1.7, "url": "http://trac.webkit.org/changeset/79159" }, { "trust": 1.7, "url": "https://bugs.webkit.org/show_bug.cgi?id=52688" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692133" }, { "trust": 1.7, "url": "http://secunia.com/advisories/43920" }, { "trust": 1.2, "url": "http://www.debian.org/security/2011/dsa-2219" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:063" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0486.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1025284" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44167" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44423" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0855" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0858" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/1010" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/1172" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66506" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1425" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1425" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/16803" }, { "trust": 0.3, "url": "http://www.aleksey.com/" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100134942" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100151369" }, { "trust": 0.3, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.3, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1425" }, { "trust": 0.2, "url": "http://secunia.com/research/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44423/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44423/" }, { "trust": 0.1, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-0486.html" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44423" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44167" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44167/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44167/" }, { "trust": 0.1, "url": "http://secunia.com/company/jobs/open_positions/reverse_engineer" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43920" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43920/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43920/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3259" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1791" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3374" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1785" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1793" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1760" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1790" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3257" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3365" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1787" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1791" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4023" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1785" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1784" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3257" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1788" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0721" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0007" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4111" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3812" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2473" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4577" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1815" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3259" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-4370" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1812" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1951" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4198" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1786" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0904" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2526" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0778" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1792" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0482" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1144" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0778" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4578" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1572" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1786" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3999" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1792" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1788" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3255" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4023" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1815" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1807" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1787" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0905" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4111" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3367" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1782" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3389" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2526" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-4370" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1807" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3389" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2901" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2472" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1784" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3374" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3362" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1780" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1790" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2524" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4204" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3255" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1780" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4206" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3362" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3813" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4197" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1097" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1793" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2901" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3366" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1072" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201412-09.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0727" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4042" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1812" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://store.mandriva.com/product_info.php?cpath=149\u0026amp;products_id=490" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" } ], "sources": [ { "db": "VULHUB", "id": "VHN-49370" }, { "db": "BID", "id": "47135" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "PACKETSTORM", "id": "100561" }, { "db": "PACKETSTORM", "id": "101158" }, { "db": "PACKETSTORM", "id": "100587" }, { "db": "PACKETSTORM", "id": "99973" }, { "db": "PACKETSTORM", "id": "129522" }, { "db": "PACKETSTORM", "id": "100044" }, { "db": "CNNVD", "id": "CNNVD-201104-019" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-49370" }, { "db": "BID", "id": "47135" }, { "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "db": "PACKETSTORM", "id": "100561" }, { "db": "PACKETSTORM", "id": "101158" }, { "db": "PACKETSTORM", "id": "100587" }, { "db": "PACKETSTORM", "id": "99973" }, { "db": "PACKETSTORM", "id": "129522" }, { "db": "PACKETSTORM", "id": "100044" }, { "db": "CNNVD", "id": "CNNVD-201104-019" }, { "db": "NVD", "id": "CVE-2011-1425" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-04T00:00:00", "db": "VULHUB", "id": "VHN-49370" }, { "date": "2011-04-04T00:00:00", "db": "BID", "id": "47135" }, { "date": "2011-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "date": "2011-04-19T03:58:00", "db": "PACKETSTORM", "id": "100561" }, { "date": "2011-05-06T06:57:52", "db": "PACKETSTORM", "id": "101158" }, { "date": "2011-04-19T03:35:09", "db": "PACKETSTORM", "id": "100587" }, { "date": "2011-04-01T05:46:06", "db": "PACKETSTORM", "id": "99973" }, { "date": "2014-12-12T17:42:13", "db": "PACKETSTORM", "id": "129522" }, { "date": "2011-04-04T18:31:00", "db": "PACKETSTORM", "id": "100044" }, { "date": "2011-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-019" }, { "date": "2011-04-04T12:27:57.437000", "db": "NVD", "id": "CVE-2011-1425" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-17T00:00:00", "db": "VULHUB", "id": "VHN-49370" }, { "date": "2014-12-19T00:56:00", "db": "BID", "id": "47135" }, { "date": "2011-05-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001622" }, { "date": "2011-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201104-019" }, { "date": "2024-11-21T01:26:16.960000", "db": "NVD", "id": "CVE-2011-1425" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "100561" }, { "db": "PACKETSTORM", "id": "100044" }, { "db": "CNNVD", "id": "CNNVD-201104-019" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebKit Used in xslt.c Vulnerable to arbitrary file creation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001622" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201104-019" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.