Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-3411
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2013:072", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072" }, { "name": "RHSA-2013:0276", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "name": "[oss-security] 20120712 Re: Re: CVE Request -- dnsmasq: When being run by libvirt open DNS proxy (reachable out-of the virtual network set for the particular guest domain too) is created", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "name": "RHSA-2013:0579", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "54353", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/54353" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "name": "RHSA-2013:0277", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-02T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2013:072", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072" }, { "name": "RHSA-2013:0276", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "name": "[oss-security] 20120712 Re: Re: CVE Request -- dnsmasq: When being run by libvirt open DNS proxy (reachable out-of the virtual network set for the particular guest domain too) is created", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "name": "RHSA-2013:0579", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "54353", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/54353" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "name": "RHSA-2013:0277", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3411", "datePublished": "2013-03-04T21:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-3411\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-03-05T21:38:54.753\",\"lastModified\":\"2024-11-21T01:40:49.047\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.\"},{\"lang\":\"es\",\"value\":\"Dnsmasq anterior a v2.63test1, cuando se usa con determinadas configuraciones en libvirt, contesta a las peticiones desde interfaces prohibidas, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicios (amplificaci\u00f3n de tr\u00e1fico) a trav\u00e9s de una petici\u00f3n DNS falsificada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.62\",\"matchCriteriaId\":\"60CD037E-992D-4DFB-95DE-81656C9D4005\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0276.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0277.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0579.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:072\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/07/12/5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/54353\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=833033\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0276.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0277.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0579.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/07/12/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/54353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.thekelleys.org.uk/dnsmasq/CHANGELOG\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=833033\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2013_0276
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libvirt packages that fix one security issue, multiple bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nIt was discovered that libvirt made certain invalid assumptions about\ndnsmasq\u0027s command line options when setting up DNS masquerading for virtual\nmachines, resulting in dnsmasq incorrectly processing network packets from\nnetwork interfaces that were intended to be prohibited. This update\nincludes the changes necessary to call dnsmasq with a new command line\noption, which was introduced to dnsmasq via RHSA-2013:0277. (CVE-2012-3411)\n\nIn order for libvirt to be able to make use of the new command line option\n(--bind-dynamic), updated dnsmasq packages need to be installed. Refer to\nRHSA-2013:0277 for additional information.\n\nThese updated libvirt packages include numerous bug fixes and enhancements.\nSpace precludes documenting all of these changes in this advisory. Users\nare directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linked\nto in the References, for information on the most significant of these\nchanges.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. After installing the\nupdated packages, libvirtd must be restarted (\"service libvirtd restart\")\nfor this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0276", "url": "https://access.redhat.com/errata/RHSA-2013:0276" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/libvirt.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.4_Technical_Notes/libvirt.html" }, { "category": "external", "summary": "695394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695394" }, { "category": "external", "summary": "713922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=713922" }, { "category": "external", "summary": "724893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=724893" }, { "category": "external", "summary": "770285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770285" }, { "category": "external", "summary": "770795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770795" }, { "category": "external", "summary": "770830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770830" }, { "category": "external", "summary": "771424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771424" }, { "category": "external", "summary": "772290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=772290" }, { "category": "external", "summary": "787906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787906" }, { "category": "external", "summary": "789327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789327" }, { "category": "external", "summary": "798467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=798467" }, { "category": "external", "summary": "799986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799986" }, { "category": "external", "summary": "801772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801772" }, { "category": "external", "summary": "803577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803577" }, { "category": "external", "summary": "804601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804601" }, { "category": "external", "summary": "805071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805071" }, { "category": "external", "summary": "805243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805243" }, { "category": "external", "summary": "805361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805361" }, { "category": "external", "summary": "807545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807545" }, { "category": "external", "summary": "807907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807907" }, { "category": "external", "summary": "807996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807996" }, { "category": "external", "summary": "810799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810799" }, { "category": "external", "summary": "813191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813191" }, { "category": "external", "summary": "813735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813735" }, { "category": "external", "summary": "813819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813819" }, { "category": "external", "summary": "815644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815644" }, { "category": "external", "summary": "816448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816448" }, { "category": "external", "summary": "816503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816503" }, { "category": "external", "summary": "816609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816609" }, { "category": "external", "summary": "817219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817219" }, { "category": "external", "summary": "817239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817239" }, { "category": "external", "summary": "817244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817244" }, { "category": "external", "summary": "818467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818467" }, { "category": "external", "summary": "818996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818996" }, { "category": "external", "summary": "819401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819401" }, { "category": "external", "summary": "820173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820173" }, { "category": "external", "summary": "821665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821665" }, { "category": "external", "summary": "822068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822068" }, { "category": "external", "summary": "822340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822340" }, { "category": "external", "summary": "822373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822373" }, { "category": "external", "summary": "823362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823362" }, { "category": "external", "summary": "823765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823765" }, { "category": "external", "summary": "823850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823850" }, { "category": "external", "summary": "823857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823857" }, { "category": "external", "summary": "824253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824253" }, { "category": "external", "summary": "825068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825068" }, { "category": "external", "summary": "825108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825108" }, { "category": "external", "summary": "825600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825600" }, { "category": "external", "summary": "825699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825699" }, { "category": "external", "summary": "825820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825820" }, { "category": "external", "summary": "827234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827234" }, { "category": "external", "summary": "827380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827380" }, { "category": "external", "summary": "827519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827519" }, { "category": "external", "summary": "828023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828023" }, { "category": "external", "summary": "828640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828640" }, { "category": "external", "summary": "828676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828676" }, { "category": "external", "summary": "828729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828729" }, { "category": "external", "summary": "829107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829107" }, { "category": "external", "summary": "829246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829246" }, { "category": "external", "summary": "829562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829562" }, { "category": "external", "summary": "830051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830051" }, { "category": "external", "summary": "830057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830057" }, { "category": "external", "summary": "831044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831044" }, { "category": "external", "summary": "831049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831049" }, { "category": "external", "summary": "831099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831099" }, { "category": "external", "summary": "831149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831149" }, { "category": "external", "summary": "832004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832004" }, { "category": "external", "summary": "832081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832081" }, { "category": "external", "summary": "832156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832156" }, { "category": "external", "summary": "832302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832302" }, { "category": "external", "summary": "832309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832309" }, { "category": "external", "summary": "832329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832329" }, { "category": "external", "summary": "832372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832372" }, { "category": "external", "summary": "833327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833327" }, { "category": "external", "summary": "833674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833674" }, { "category": "external", "summary": "834365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834365" }, { "category": "external", "summary": "834927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834927" }, { "category": "external", "summary": "835782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835782" }, { "category": "external", "summary": "836135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836135" }, { "category": "external", "summary": "837466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837466" }, { "category": "external", "summary": "837470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837470" }, { "category": "external", "summary": "837485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837485" }, { "category": "external", "summary": "837542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837542" }, { "category": "external", "summary": "837544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837544" }, { "category": "external", "summary": "837761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837761" }, { "category": "external", "summary": "837884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837884" }, { "category": "external", "summary": "839537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839537" }, { "category": "external", "summary": "839557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839557" }, { "category": "external", "summary": "839661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839661" }, { "category": "external", "summary": "839930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839930" }, { "category": "external", "summary": "842208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842208" }, { "category": "external", "summary": "842272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842272" }, { "category": "external", "summary": "842557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842557" }, { "category": "external", "summary": "842966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842966" }, { "category": "external", "summary": "842979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842979" }, { "category": "external", "summary": "843324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843324" }, { "category": "external", "summary": "843372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843372" }, { "category": "external", "summary": "843560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843560" }, { "category": "external", "summary": "843716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843716" }, { "category": "external", "summary": "844266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844266" }, { "category": "external", "summary": "844408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844408" }, { "category": "external", "summary": "845448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845448" }, { "category": "external", "summary": "845460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845460" }, { "category": "external", "summary": "845468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845468" }, { "category": "external", "summary": "845521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845521" }, { "category": "external", "summary": "845523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845523" }, { "category": "external", "summary": "845635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845635" }, { "category": "external", "summary": "845893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845893" }, { "category": "external", "summary": "845958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845958" }, { "category": "external", "summary": "845966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845966" }, { "category": "external", "summary": "845968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845968" }, { "category": "external", "summary": "846265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846265" }, { "category": "external", "summary": "846629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846629" }, { "category": "external", "summary": "846639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846639" }, { "category": "external", "summary": "848648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848648" }, { "category": "external", "summary": "851391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851391" }, { "category": "external", "summary": "851395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851395" }, { "category": "external", "summary": "851397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851397" }, { "category": "external", "summary": "851423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851423" }, { "category": "external", "summary": "851452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851452" }, { "category": "external", "summary": "851491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851491" }, { "category": "external", "summary": "851959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851959" }, { "category": "external", "summary": "851963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851963" }, { "category": "external", "summary": "851981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851981" }, { "category": "external", "summary": "852260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852260" }, { "category": "external", "summary": "852383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852383" }, { "category": "external", "summary": "852592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852592" }, { "category": "external", "summary": "852668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852668" }, { "category": "external", "summary": "852675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852675" }, { "category": "external", "summary": "852984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852984" }, { "category": "external", "summary": "853002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853002" }, { "category": "external", "summary": "853043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853043" }, { "category": "external", "summary": "853342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853342" }, { "category": "external", "summary": "853567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853567" }, { "category": "external", "summary": "853821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853821" }, { "category": "external", "summary": "853925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853925" }, { "category": "external", "summary": "853930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853930" }, { "category": "external", "summary": "854133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854133" }, { "category": "external", "summary": "854135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854135" }, { "category": "external", "summary": "855218", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855218" }, { "category": "external", "summary": "855237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855237" }, { "category": "external", "summary": "855783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855783" }, { "category": "external", "summary": "856247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856247" }, { "category": "external", "summary": "856489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856489" }, { "category": "external", "summary": "856528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856528" }, { "category": "external", "summary": "856864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856864" }, { "category": "external", "summary": "856950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856950" }, { "category": "external", "summary": "856951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856951" }, { "category": "external", "summary": "857013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857013" }, { "category": "external", "summary": "857341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857341" }, { "category": "external", "summary": "857367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857367" }, { "category": "external", "summary": "858204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858204" }, { "category": "external", "summary": "859320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859320" }, { "category": "external", "summary": "859331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859331" }, { "category": "external", "summary": "859712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859712" }, { "category": "external", "summary": "860519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860519" }, { "category": "external", "summary": "860907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860907" }, { "category": "external", "summary": "860971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860971" }, { "category": "external", "summary": "861564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=861564" }, { "category": "external", "summary": "863059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863059" }, { "category": "external", "summary": "863115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863115" }, { "category": "external", "summary": "864097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864097" }, { "category": "external", "summary": "864122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864122" }, { "category": "external", "summary": "864336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864336" }, { "category": "external", "summary": "864384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864384" }, { "category": "external", "summary": "865670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865670" }, { "category": "external", "summary": "866288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866288" }, { "category": "external", "summary": "866364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866364" }, { "category": "external", "summary": "866369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866369" }, { "category": "external", "summary": "866388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866388" }, { "category": "external", "summary": "866508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866508" }, { "category": "external", "summary": "866524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866524" }, { "category": "external", "summary": "866999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866999" }, { "category": "external", "summary": "867246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867246" }, { "category": "external", "summary": "867372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867372" }, { "category": "external", "summary": "867412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867412" }, { "category": "external", "summary": "867724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867724" }, { "category": "external", "summary": "867764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867764" }, { "category": "external", "summary": "868389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868389" }, { "category": "external", "summary": "868483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868483" }, { "category": "external", "summary": "868692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868692" }, { "category": "external", "summary": "869096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869096" }, { "category": "external", "summary": "869100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869100" }, { "category": "external", "summary": "869508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869508" }, { "category": "external", "summary": "869557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869557" }, { "category": "external", "summary": "870099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870099" }, { "category": "external", "summary": "870273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870273" }, { "category": "external", "summary": "871055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871055" }, { "category": "external", "summary": "871201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871201" }, { "category": "external", "summary": "871312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871312" }, { "category": "external", "summary": "872104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872104" }, { "category": "external", "summary": "872656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872656" }, { "category": "external", "summary": "873134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873134" }, { "category": "external", "summary": "873537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873537" }, { "category": "external", "summary": "873538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873538" }, { "category": "external", "summary": "873792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873792" }, { "category": "external", "summary": "873934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873934" }, { "category": "external", "summary": "874050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874050" }, { "category": "external", "summary": "874171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874171" }, { "category": "external", "summary": "874330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874330" }, { "category": "external", "summary": "874549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874549" }, { "category": "external", "summary": "874702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874702" }, { "category": "external", "summary": "874860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874860" }, { "category": "external", "summary": "876415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876415" }, { "category": "external", "summary": "876816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876816" }, { "category": "external", "summary": "876817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876817" }, { "category": "external", "summary": "876828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876828" }, { "category": "external", "summary": "876868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876868" }, { "category": "external", "summary": "877095", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877095" }, { "category": "external", "summary": "877303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877303" }, { "category": "external", "summary": "878376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878376" }, { "category": "external", "summary": "878400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878400" }, { "category": "external", "summary": "878779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878779" }, { "category": "external", "summary": "878862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878862" }, { "category": "external", "summary": "879130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879130" }, { "category": "external", "summary": "879132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879132" }, { "category": "external", "summary": "879360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879360" }, { "category": "external", "summary": "879473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879473" }, { "category": "external", "summary": "879780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879780" }, { "category": "external", "summary": "880064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880064" }, { "category": "external", "summary": "880919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880919" }, { "category": "external", "summary": "881480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881480" }, { "category": "external", "summary": "882915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882915" }, { "category": "external", "summary": "883832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=883832" }, { "category": "external", "summary": "884650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=884650" }, { "category": "external", "summary": "885081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885081" }, { "category": "external", "summary": "885727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885727" }, { "category": "external", "summary": "885838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885838" }, { "category": "external", "summary": "886821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886821" }, { "category": "external", "summary": "886933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886933" }, { "category": "external", "summary": "887187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887187" }, { "category": "external", "summary": "888426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=888426" }, { "category": "external", "summary": "889319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889319" }, { "category": "external", "summary": "889407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889407" }, { "category": "external", "summary": "891653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891653" }, { "category": "external", "summary": "894085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894085" }, { "category": "external", "summary": "896403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896403" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0276.json" } ], "title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:38:59+00:00", "generator": { "date": "2024-11-22T05:38:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0276", "initial_release_date": "2013-02-20T16:18:00+00:00", "revision_history": [ { "date": "2013-02-20T16:18:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-20T16:18:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:38:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Server 3", "product": { "name": "Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:server:el6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-devel-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-python-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-python-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.x86_64", "product": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64", "product_id": "libvirt-client-0:0.10.2-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libvirt-0:0.10.2-18.el6.src", "product": { "name": "libvirt-0:0.10.2-18.el6.src", "product_id": "libvirt-0:0.10.2-18.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.i686", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.i686", "product_id": "libvirt-devel-0:0.10.2-18.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=i686" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=i686" } } }, { "category": "product_version", "name": "libvirt-python-0:0.10.2-18.el6.i686", "product": { "name": "libvirt-python-0:0.10.2-18.el6.i686", "product_id": "libvirt-python-0:0.10.2-18.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6?arch=i686" } } }, { "category": "product_version", "name": "libvirt-0:0.10.2-18.el6.i686", "product": { "name": "libvirt-0:0.10.2-18.el6.i686", "product_id": "libvirt-0:0.10.2-18.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6?arch=i686" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.i686", "product": { "name": "libvirt-client-0:0.10.2-18.el6.i686", "product_id": "libvirt-client-0:0.10.2-18.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libvirt-python-0:0.10.2-18.el6.ppc64", "product": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64", "product_id": "libvirt-python-0:0.10.2-18.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.ppc64", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64", "product_id": "libvirt-devel-0:0.10.2-18.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-0:0.10.2-18.el6.ppc64", "product": { "name": "libvirt-0:0.10.2-18.el6.ppc64", "product_id": "libvirt-0:0.10.2-18.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6?arch=ppc64" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.ppc64", "product": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64", "product_id": "libvirt-client-0:0.10.2-18.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.ppc", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc", "product_id": "libvirt-devel-0:0.10.2-18.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=ppc" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.ppc", "product": { "name": "libvirt-client-0:0.10.2-18.el6.ppc", "product_id": "libvirt-client-0:0.10.2-18.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libvirt-python-0:0.10.2-18.el6.s390x", "product": { "name": "libvirt-python-0:0.10.2-18.el6.s390x", "product_id": "libvirt-python-0:0.10.2-18.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.s390x", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x", "product_id": "libvirt-devel-0:0.10.2-18.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-0:0.10.2-18.el6.s390x", "product": { "name": "libvirt-0:0.10.2-18.el6.s390x", "product_id": "libvirt-0:0.10.2-18.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6?arch=s390x" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.s390x", "product": { "name": "libvirt-client-0:0.10.2-18.el6.s390x", "product_id": "libvirt-client-0:0.10.2-18.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libvirt-devel-0:0.10.2-18.el6.s390", "product": { "name": "libvirt-devel-0:0.10.2-18.el6.s390", "product_id": "libvirt-devel-0:0.10.2-18.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6?arch=s390" } } }, { "category": "product_version", "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "product": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "product_id": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6?arch=s390" } } }, { "category": "product_version", "name": "libvirt-client-0:0.10.2-18.el6.s390", "product": { "name": "libvirt-client-0:0.10.2-18.el6.s390", "product_id": "libvirt-client-0:0.10.2-18.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Storage Server 3", "product_id": "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-RHS-Server-3" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-0:0.10.2-18.el6.src" }, "product_reference": "libvirt-0:0.10.2-18.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-client-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-client-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-client-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-devel-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-devel-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-devel-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-python-0:0.10.2-18.el6.i686" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-python-0:0.10.2-18.el6.ppc64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-python-0:0.10.2-18.el6.s390x" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libvirt-python-0:0.10.2-18.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:libvirt-python-0:0.10.2-18.el6.x86_64" }, "product_reference": "libvirt-python-0:0.10.2-18.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3411", "discovery_date": "2012-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "833033" } ], "notes": [ { "category": "description", "text": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:libvirt-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-0:0.10.2-18.el6.src", "6Client-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Client:libvirt-0:0.10.2-18.el6.i686", "6Client:libvirt-0:0.10.2-18.el6.ppc64", "6Client:libvirt-0:0.10.2-18.el6.s390x", "6Client:libvirt-0:0.10.2-18.el6.src", "6Client:libvirt-0:0.10.2-18.el6.x86_64", "6Client:libvirt-client-0:0.10.2-18.el6.i686", "6Client:libvirt-client-0:0.10.2-18.el6.ppc", "6Client:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client:libvirt-client-0:0.10.2-18.el6.s390", "6Client:libvirt-client-0:0.10.2-18.el6.s390x", "6Client:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client:libvirt-devel-0:0.10.2-18.el6.i686", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client:libvirt-devel-0:0.10.2-18.el6.s390", "6Client:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client:libvirt-python-0:0.10.2-18.el6.i686", "6Client:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client:libvirt-python-0:0.10.2-18.el6.s390x", "6Client:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.src", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-0:0.10.2-18.el6.src", "6ComputeNode:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.src", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-0:0.10.2-18.el6.src", "6Server-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server:libvirt-0:0.10.2-18.el6.i686", "6Server:libvirt-0:0.10.2-18.el6.ppc64", "6Server:libvirt-0:0.10.2-18.el6.s390x", "6Server:libvirt-0:0.10.2-18.el6.src", "6Server:libvirt-0:0.10.2-18.el6.x86_64", "6Server:libvirt-client-0:0.10.2-18.el6.i686", "6Server:libvirt-client-0:0.10.2-18.el6.ppc", "6Server:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server:libvirt-client-0:0.10.2-18.el6.s390", "6Server:libvirt-client-0:0.10.2-18.el6.s390x", "6Server:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server:libvirt-devel-0:0.10.2-18.el6.i686", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server:libvirt-devel-0:0.10.2-18.el6.s390", "6Server:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server:libvirt-python-0:0.10.2-18.el6.i686", "6Server:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server:libvirt-python-0:0.10.2-18.el6.s390x", "6Server:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-0:0.10.2-18.el6.src", "6Workstation-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-0:0.10.2-18.el6.i686", "6Workstation:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-0:0.10.2-18.el6.src", "6Workstation:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-python-0:0.10.2-18.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3411" }, { "category": "external", "summary": "RHBZ#833033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3411", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3411" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411" } ], "release_date": "2012-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-20T16:18:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-optional:libvirt-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-0:0.10.2-18.el6.src", "6Client-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Client:libvirt-0:0.10.2-18.el6.i686", "6Client:libvirt-0:0.10.2-18.el6.ppc64", "6Client:libvirt-0:0.10.2-18.el6.s390x", "6Client:libvirt-0:0.10.2-18.el6.src", "6Client:libvirt-0:0.10.2-18.el6.x86_64", "6Client:libvirt-client-0:0.10.2-18.el6.i686", "6Client:libvirt-client-0:0.10.2-18.el6.ppc", "6Client:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client:libvirt-client-0:0.10.2-18.el6.s390", "6Client:libvirt-client-0:0.10.2-18.el6.s390x", "6Client:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client:libvirt-devel-0:0.10.2-18.el6.i686", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client:libvirt-devel-0:0.10.2-18.el6.s390", "6Client:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client:libvirt-python-0:0.10.2-18.el6.i686", "6Client:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client:libvirt-python-0:0.10.2-18.el6.s390x", "6Client:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.src", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-0:0.10.2-18.el6.src", "6ComputeNode:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.src", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-0:0.10.2-18.el6.src", "6Server-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server:libvirt-0:0.10.2-18.el6.i686", "6Server:libvirt-0:0.10.2-18.el6.ppc64", "6Server:libvirt-0:0.10.2-18.el6.s390x", "6Server:libvirt-0:0.10.2-18.el6.src", "6Server:libvirt-0:0.10.2-18.el6.x86_64", "6Server:libvirt-client-0:0.10.2-18.el6.i686", "6Server:libvirt-client-0:0.10.2-18.el6.ppc", "6Server:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server:libvirt-client-0:0.10.2-18.el6.s390", "6Server:libvirt-client-0:0.10.2-18.el6.s390x", "6Server:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server:libvirt-devel-0:0.10.2-18.el6.i686", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server:libvirt-devel-0:0.10.2-18.el6.s390", "6Server:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server:libvirt-python-0:0.10.2-18.el6.i686", "6Server:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server:libvirt-python-0:0.10.2-18.el6.s390x", "6Server:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-0:0.10.2-18.el6.src", "6Workstation-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-0:0.10.2-18.el6.i686", "6Workstation:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-0:0.10.2-18.el6.src", "6Workstation:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-python-0:0.10.2-18.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0276" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:libvirt-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-0:0.10.2-18.el6.src", "6Client-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Client-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Client-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Client:libvirt-0:0.10.2-18.el6.i686", "6Client:libvirt-0:0.10.2-18.el6.ppc64", "6Client:libvirt-0:0.10.2-18.el6.s390x", "6Client:libvirt-0:0.10.2-18.el6.src", "6Client:libvirt-0:0.10.2-18.el6.x86_64", "6Client:libvirt-client-0:0.10.2-18.el6.i686", "6Client:libvirt-client-0:0.10.2-18.el6.ppc", "6Client:libvirt-client-0:0.10.2-18.el6.ppc64", "6Client:libvirt-client-0:0.10.2-18.el6.s390", "6Client:libvirt-client-0:0.10.2-18.el6.s390x", "6Client:libvirt-client-0:0.10.2-18.el6.x86_64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Client:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Client:libvirt-devel-0:0.10.2-18.el6.i686", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc", "6Client:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Client:libvirt-devel-0:0.10.2-18.el6.s390", "6Client:libvirt-devel-0:0.10.2-18.el6.s390x", "6Client:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Client:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Client:libvirt-python-0:0.10.2-18.el6.i686", "6Client:libvirt-python-0:0.10.2-18.el6.ppc64", "6Client:libvirt-python-0:0.10.2-18.el6.s390x", "6Client:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.src", "6ComputeNode-optional:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-0:0.10.2-18.el6.src", "6ComputeNode:libvirt-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-client-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-devel-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.i686", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.ppc64", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.s390x", "6ComputeNode:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.src", "6Server-RHS-Server-3:libvirt-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.i686", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-RHS-Server-3:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-0:0.10.2-18.el6.src", "6Server-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Server-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Server-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Server:libvirt-0:0.10.2-18.el6.i686", "6Server:libvirt-0:0.10.2-18.el6.ppc64", "6Server:libvirt-0:0.10.2-18.el6.s390x", "6Server:libvirt-0:0.10.2-18.el6.src", "6Server:libvirt-0:0.10.2-18.el6.x86_64", "6Server:libvirt-client-0:0.10.2-18.el6.i686", "6Server:libvirt-client-0:0.10.2-18.el6.ppc", "6Server:libvirt-client-0:0.10.2-18.el6.ppc64", "6Server:libvirt-client-0:0.10.2-18.el6.s390", "6Server:libvirt-client-0:0.10.2-18.el6.s390x", "6Server:libvirt-client-0:0.10.2-18.el6.x86_64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Server:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Server:libvirt-devel-0:0.10.2-18.el6.i686", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc", "6Server:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Server:libvirt-devel-0:0.10.2-18.el6.s390", "6Server:libvirt-devel-0:0.10.2-18.el6.s390x", "6Server:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Server:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Server:libvirt-python-0:0.10.2-18.el6.i686", "6Server:libvirt-python-0:0.10.2-18.el6.ppc64", "6Server:libvirt-python-0:0.10.2-18.el6.s390x", "6Server:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-0:0.10.2-18.el6.src", "6Workstation-optional:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation-optional:libvirt-python-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-0:0.10.2-18.el6.i686", "6Workstation:libvirt-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-0:0.10.2-18.el6.src", "6Workstation:libvirt-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-client-0:0.10.2-18.el6.i686", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-client-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390", "6Workstation:libvirt-client-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-client-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.i686", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-debuginfo-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.i686", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc", "6Workstation:libvirt-devel-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390", "6Workstation:libvirt-devel-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-devel-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-lock-sanlock-0:0.10.2-18.el6.x86_64", "6Workstation:libvirt-python-0:0.10.2-18.el6.i686", "6Workstation:libvirt-python-0:0.10.2-18.el6.ppc64", "6Workstation:libvirt-python-0:0.10.2-18.el6.s390x", "6Workstation:libvirt-python-0:0.10.2-18.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks" } ] }
rhsa-2013_0277
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated dnsmasq packages that fix one security issue, one bug, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server.\n\nIt was discovered that dnsmasq, when used in combination with certain\nlibvirtd configurations, could incorrectly process network packets from\nnetwork interfaces that were intended to be prohibited. A remote,\nunauthenticated attacker could exploit this flaw to cause a denial of\nservice via DNS amplification attacks. (CVE-2012-3411)\n\nIn order to fully address this issue, libvirt package users are advised to\ninstall updated libvirt packages. Refer to RHSA-2013:0276 for additional\ninformation.\n\nThis update also fixes the following bug:\n\n* Due to a regression, the lease change script was disabled. Consequently,\nthe \"dhcp-script\" option in the /etc/dnsmasq.conf configuration file did\nnot work. This update corrects the problem and the \"dhcp-script\" option now\nworks as expected. (BZ#815819)\n\nThis update also adds the following enhancements:\n\n* Prior to this update, dnsmasq did not validate that the tftp directory\ngiven actually existed and was a directory. Consequently, configuration\nerrors were not immediately reported on startup. This update improves the\ncode to validate the tftp root directory option. As a result, fault finding\nis simplified especially when dnsmasq is called by external processes such\nas libvirt. (BZ#824214)\n\n* The dnsmasq init script used an incorrect Process Identifier (PID) in the\n\"stop\", \"restart\", and \"condrestart\" commands. Consequently, if there were\nsome dnsmasq instances running besides the system one started by the init\nscript, then repeated calling of \"service dnsmasq\" with \"stop\" or \"restart\"\nwould kill all running dnsmasq instances, including ones not started with\nthe init script. The dnsmasq init script code has been corrected to obtain\nthe correct PID when calling the \"stop\", \"restart\", and \"condrestart\"\ncommands. As a result, if there are dnsmasq instances running in addition\nto the system one started by the init script, then by calling \"service\ndnsmasq\" with \"stop\" or \"restart\" only the system one is stopped or\nrestarted. (BZ#850944)\n\n* When two or more dnsmasq processes were running with DHCP enabled on one\ninterface, DHCP RELEASE packets were sometimes lost. Consequently, when two\nor more dnsmasq processes were running with DHCP enabled on one interface,\nreleasing IP addresses sometimes failed. This update sets the\nSO_BINDTODEVICE socket option on DHCP sockets if running dnsmasq with DHCP\nenabled on one interface. As a result, when two or more dnsmasq processes\nare running with DHCP enabled on one interface, they can release IP\naddresses as expected. (BZ#887156)\n\nAll users of dnsmasq are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0277", "url": "https://access.redhat.com/errata/RHSA-2013:0277" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2013-0276.html", "url": "https://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "category": "external", "summary": "833033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "category": "external", "summary": "850944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850944" }, { "category": "external", "summary": "884957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=884957" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0277.json" } ], "title": "Red Hat Security Advisory: dnsmasq security, bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:39:05+00:00", "generator": { "date": "2024-11-22T05:39:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0277", "initial_release_date": "2013-02-20T16:19:00+00:00", "revision_history": [ { "date": "2013-02-20T16:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-20T16:28:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:39:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.48-13.el6.x86_64", "product": { "name": "dnsmasq-0:2.48-13.el6.x86_64", "product_id": "dnsmasq-0:2.48-13.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.48-13.el6?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "product": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "product_id": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.48-13.el6?arch=x86_64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.48-13.el6.x86_64", "product": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64", "product_id": "dnsmasq-utils-0:2.48-13.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.48-13.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.48-13.el6.i686", "product": { "name": "dnsmasq-0:2.48-13.el6.i686", "product_id": "dnsmasq-0:2.48-13.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.48-13.el6?arch=i686" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "product": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "product_id": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.48-13.el6?arch=i686" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.48-13.el6.i686", "product": { "name": "dnsmasq-utils-0:2.48-13.el6.i686", "product_id": "dnsmasq-utils-0:2.48-13.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.48-13.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.48-13.el6.src", "product": { "name": "dnsmasq-0:2.48-13.el6.src", "product_id": "dnsmasq-0:2.48-13.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.48-13.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.48-13.el6.ppc64", "product": { "name": "dnsmasq-0:2.48-13.el6.ppc64", "product_id": "dnsmasq-0:2.48-13.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.48-13.el6?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "product": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "product_id": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.48-13.el6?arch=ppc64" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.48-13.el6.ppc64", "product": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64", "product_id": "dnsmasq-utils-0:2.48-13.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.48-13.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dnsmasq-0:2.48-13.el6.s390x", "product": { "name": "dnsmasq-0:2.48-13.el6.s390x", "product_id": "dnsmasq-0:2.48-13.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq@2.48-13.el6?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "product": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "product_id": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-debuginfo@2.48-13.el6?arch=s390x" } } }, { "category": "product_version", "name": "dnsmasq-utils-0:2.48-13.el6.s390x", "product": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x", "product_id": "dnsmasq-utils-0:2.48-13.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dnsmasq-utils@2.48-13.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-0:2.48-13.el6.src" }, "product_reference": "dnsmasq-0:2.48-13.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-utils-0:2.48-13.el6.i686" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-utils-0:2.48-13.el6.ppc64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-utils-0:2.48-13.el6.s390x" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dnsmasq-utils-0:2.48-13.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dnsmasq-utils-0:2.48-13.el6.x86_64" }, "product_reference": "dnsmasq-utils-0:2.48-13.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3411", "discovery_date": "2012-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "833033" } ], "notes": [ { "category": "description", "text": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:dnsmasq-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-0:2.48-13.el6.src", "6Client-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Client:dnsmasq-0:2.48-13.el6.i686", "6Client:dnsmasq-0:2.48-13.el6.ppc64", "6Client:dnsmasq-0:2.48-13.el6.s390x", "6Client:dnsmasq-0:2.48-13.el6.src", "6Client:dnsmasq-0:2.48-13.el6.x86_64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client:dnsmasq-utils-0:2.48-13.el6.i686", "6Client:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.src", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-0:2.48-13.el6.src", "6ComputeNode:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-0:2.48-13.el6.src", "6Server-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server:dnsmasq-0:2.48-13.el6.i686", "6Server:dnsmasq-0:2.48-13.el6.ppc64", "6Server:dnsmasq-0:2.48-13.el6.s390x", "6Server:dnsmasq-0:2.48-13.el6.src", "6Server:dnsmasq-0:2.48-13.el6.x86_64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server:dnsmasq-utils-0:2.48-13.el6.i686", "6Server:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-0:2.48-13.el6.src", "6Workstation-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-0:2.48-13.el6.i686", "6Workstation:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-0:2.48-13.el6.src", "6Workstation:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-utils-0:2.48-13.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3411" }, { "category": "external", "summary": "RHBZ#833033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3411", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3411" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411" } ], "release_date": "2012-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-20T16:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-optional:dnsmasq-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-0:2.48-13.el6.src", "6Client-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Client:dnsmasq-0:2.48-13.el6.i686", "6Client:dnsmasq-0:2.48-13.el6.ppc64", "6Client:dnsmasq-0:2.48-13.el6.s390x", "6Client:dnsmasq-0:2.48-13.el6.src", "6Client:dnsmasq-0:2.48-13.el6.x86_64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client:dnsmasq-utils-0:2.48-13.el6.i686", "6Client:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.src", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-0:2.48-13.el6.src", "6ComputeNode:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-0:2.48-13.el6.src", "6Server-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server:dnsmasq-0:2.48-13.el6.i686", "6Server:dnsmasq-0:2.48-13.el6.ppc64", "6Server:dnsmasq-0:2.48-13.el6.s390x", "6Server:dnsmasq-0:2.48-13.el6.src", "6Server:dnsmasq-0:2.48-13.el6.x86_64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server:dnsmasq-utils-0:2.48-13.el6.i686", "6Server:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-0:2.48-13.el6.src", "6Workstation-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-0:2.48-13.el6.i686", "6Workstation:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-0:2.48-13.el6.src", "6Workstation:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-utils-0:2.48-13.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0277" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:dnsmasq-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-0:2.48-13.el6.src", "6Client-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Client:dnsmasq-0:2.48-13.el6.i686", "6Client:dnsmasq-0:2.48-13.el6.ppc64", "6Client:dnsmasq-0:2.48-13.el6.s390x", "6Client:dnsmasq-0:2.48-13.el6.src", "6Client:dnsmasq-0:2.48-13.el6.x86_64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Client:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Client:dnsmasq-utils-0:2.48-13.el6.i686", "6Client:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Client:dnsmasq-utils-0:2.48-13.el6.s390x", "6Client:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.src", "6ComputeNode-optional:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-0:2.48-13.el6.src", "6ComputeNode:dnsmasq-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.i686", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.ppc64", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.s390x", "6ComputeNode:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-0:2.48-13.el6.src", "6Server-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Server:dnsmasq-0:2.48-13.el6.i686", "6Server:dnsmasq-0:2.48-13.el6.ppc64", "6Server:dnsmasq-0:2.48-13.el6.s390x", "6Server:dnsmasq-0:2.48-13.el6.src", "6Server:dnsmasq-0:2.48-13.el6.x86_64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Server:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Server:dnsmasq-utils-0:2.48-13.el6.i686", "6Server:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Server:dnsmasq-utils-0:2.48-13.el6.s390x", "6Server:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-0:2.48-13.el6.src", "6Workstation-optional:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation-optional:dnsmasq-utils-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-0:2.48-13.el6.i686", "6Workstation:dnsmasq-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-0:2.48-13.el6.src", "6Workstation:dnsmasq-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.i686", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-debuginfo-0:2.48-13.el6.x86_64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.i686", "6Workstation:dnsmasq-utils-0:2.48-13.el6.ppc64", "6Workstation:dnsmasq-utils-0:2.48-13.el6.s390x", "6Workstation:dnsmasq-utils-0:2.48-13.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks" } ] }
rhsa-2013_0579
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes three security issues,\nvarious bugs, and adds an enhancement is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user could use this flaw\nto crash the host or, potentially, escalate their privileges on the host.\n(CVE-2013-0311)\n\nIt was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. (CVE-2012-4542)\n\nIt was discovered that dnsmasq, when used in combination with certain\nlibvirtd configurations, could incorrectly process network packets from\nnetwork interfaces that were intended to be prohibited. A remote,\nunauthenticated attacker could exploit this flaw to cause a denial of\nservice via DNS amplification attacks. (CVE-2012-3411)\n\nThe CVE-2012-4542 issue was discovered by Paolo Bonzini of Red Hat.\n\nThis updated package provides updated components that include fixes for\nseveral security issues. These issues had no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-3955 (dhcp issue)\n\nCVE-2011-4355 (gdb issue)\n\nCVE-2012-4508, CVE-2013-0190, CVE-2013-0309, and CVE-2013-0310 (kernel\nissues)\n\nCVE-2012-5536 (openssh issue)\n\nCVE-2011-3148 and CVE-2011-3149 (pam issues)\n\nCVE-2013-0157 (util-linux-ng issue)\n\nThis updated Red Hat Enterprise Virtualization Hypervisor package also\nfixes the following bugs:\n\n* Previously, the Administration Portal would always display the option to\nupgrade the Red Hat Enterprise Virtualization Hypervisor ISO regardless of\nwhether or not the selected host was up-to-date. Now, the VDSM version\ncompatibility is considered and the upgrade message only displays if there\nis an upgrade relevant to the host available. (BZ#853092)\n\n* An out of date version of libvirt was included in the Red Hat Enterprise\nVirtualization Hypervisor 6.4 package. As a result, virtual machines with\nsupported CPU models were not being properly parsed by libvirt and failed\nto start. A more recent version of libvirt has been included in this\nupdated hypervisor package. Virtual machines now start normally.\n(BZ#895078)\n\nAs well, this update adds the following enhancement:\n\n* Hypervisor packages now take advantage of the installonlypkg function\nprovided by yum. This allows for multiple versions of the hypervisor\npackage to be installed on a system concurrently without making changes to\nthe yum configuration as was previously required. (BZ#863579)\n\nThis update includes the ovirt-node build from RHBA-2013:0556:\n\n https://rhn.redhat.com/errata/RHBA-2013-0556.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which fixes these issues and adds this\nenhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0579", "url": "https://access.redhat.com/errata/RHSA-2013:0579" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2013-0556.html", "url": "https://rhn.redhat.com/errata/RHBA-2013-0556.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/articles/11258", "url": "https://access.redhat.com/knowledge/articles/11258" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "833033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "category": "external", "summary": "835162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835162" }, { "category": "external", "summary": "853092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853092" }, { "category": "external", "summary": "863579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863579" }, { "category": "external", "summary": "875360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360" }, { "category": "external", "summary": "912905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0579.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T06:38:29+00:00", "generator": { "date": "2024-11-22T06:38:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0579", "initial_release_date": "2013-02-28T18:40:00+00:00", "revision_history": [ { "date": "2013-02-28T18:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-28T18:55:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:38:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch", "product": { "name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch", "product_id": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.4-20130221.0.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" }, "product_reference": "rhev-hypervisor6-0:6.4-20130221.0.el6.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-3411", "discovery_date": "2012-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "833033" } ], "notes": [ { "category": "description", "text": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "title": "Vulnerability description" }, { "category": "summary", "text": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3411" }, { "category": "external", "summary": "RHBZ#833033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3411", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3411" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411" } ], "release_date": "2012-07-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-28T18:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0579" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks" }, { "acknowledgments": [ { "names": [ "Paolo Bonzini" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-4542", "discovery_date": "2012-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "875360" } ], "notes": [ { "category": "description", "text": "block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. Due to the lack of upstream patches and the Moderate impact, we are not planning to address this issue in Red Hat Enterprise Linux 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4542" }, { "category": "external", "summary": "RHBZ#875360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4542", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4542" } ], "release_date": "2013-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-28T18:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0579" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: block: default SCSI command filter does not accomodate commands overlap across device classes" }, { "cve": "CVE-2013-0311", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "912905" } ], "notes": [ { "category": "description", "text": "The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vhost: fix length for cross region descriptor", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0311" }, { "category": "external", "summary": "RHBZ#912905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=912905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0311", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0311" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0311" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-28T18:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization\nenvironments using the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0579" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.4-20130221.0.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: vhost: fix length for cross region descriptor" } ] }
var-201303-0027
Vulnerability from variot
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query. Dnsmasq is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service conditions through a stream of spoofed DNS queries producing large results. Dnsmasq versions 2.62 and prior are vulnerable. Relevant releases/architectures:
RHEV Hypervisor for RHEL-6 - noarch
- The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions.
A flaw was found in the way the vhost kernel module handled descriptors that spanned multiple regions. A privileged guest user could use this flaw to crash the host or, potentially, escalate their privileges on the host. (CVE-2013-0311)
It was found that the default SCSI command filter does not accommodate commands that overlap across device classes. A privileged guest user could potentially use this flaw to write arbitrary data to a LUN that is passed-through as read-only. Now, the VDSM version compatibility is considered and the upgrade message only displays if there is an upgrade relevant to the host available. As a result, virtual machines with supported CPU models were not being properly parsed by libvirt and failed to start. Virtual machines now start normally. This allows for multiple versions of the hypervisor package to be installed on a system concurrently without making changes to the yum configuration as was previously required. Bugs fixed (http://bugzilla.redhat.com/):
833033 - CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks 835162 - rhev-hypervisor 6.4 release 853092 - rhev-h: supported vdsm compatibility versions should be supplied along with rhev-h ISOs 863579 - RFE: Support installonlypkgs functionality for rhev-hypervisor packages 875360 - CVE-2012-4542 kernel: block: default SCSI command filter does not accomodate commands overlap across device classes 912905 - CVE-2013-0311 kernel: vhost: fix length for cross region descriptor
-
packets that should not be passed in) may be sent to the dnsmasq application and processed. This can result in DNS amplification attacks for example (CVE-2012-3411). It was found that after the upstream patch for CVE-2012-3411 issue was applied, dnsmasq still:
-
replied to remote TCP-protocol based DNS queries (UDP protocol ones were corrected, but TCP ones not) from prohibited networks, when the --bind-dynamic option was used,
-
when --except-interface lo option was used dnsmasq didn't answer local or remote UDP DNS queries, but still allowed TCP protocol based DNS queries,
-
when --except-interface lo option was not used local / remote TCP DNS queries were also still answered by dnsmasq.
This update fix these three cases. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFRYvSNmqjQ0CJFipgRAmDuAKDqB4WerX13N+7g/zR6iU5C6b8QjACdEdEW koGb8Voa5rhgjjRVCT1ZvBg= =VQ4h -----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201406-24
http://security.gentoo.org/
Severity: Normal Title: Dnsmasq: Denial of Service Date: June 25, 2014 Bugs: #436894, #453170 ID: 201406-24
Synopsis
A vulnerability in Dnsmasq can lead to a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All Dnsmasq users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.66"
References
[ 1 ] CVE-2012-3411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411 [ 2 ] CVE-2013-0198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201406-24.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: dnsmasq security, bug fix and enhancement update Advisory ID: RHSA-2013:0277-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0277.html Issue date: 2013-02-21 CVE Names: CVE-2012-3411 =====================================================================
- Summary:
Updated dnsmasq packages that fix one security issue, one bug, and add various enhancements are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
It was discovered that dnsmasq, when used in combination with certain libvirtd configurations, could incorrectly process network packets from network interfaces that were intended to be prohibited. (CVE-2012-3411)
In order to fully address this issue, libvirt package users are advised to install updated libvirt packages. Refer to RHSA-2013:0276 for additional information.
This update also fixes the following bug:
- Due to a regression, the lease change script was disabled. Consequently, the "dhcp-script" option in the /etc/dnsmasq.conf configuration file did not work. This update corrects the problem and the "dhcp-script" option now works as expected. (BZ#815819)
This update also adds the following enhancements:
-
Prior to this update, dnsmasq did not validate that the tftp directory given actually existed and was a directory. Consequently, configuration errors were not immediately reported on startup. This update improves the code to validate the tftp root directory option. As a result, fault finding is simplified especially when dnsmasq is called by external processes such as libvirt. (BZ#824214)
-
The dnsmasq init script used an incorrect Process Identifier (PID) in the "stop", "restart", and "condrestart" commands. Consequently, if there were some dnsmasq instances running besides the system one started by the init script, then repeated calling of "service dnsmasq" with "stop" or "restart" would kill all running dnsmasq instances, including ones not started with the init script. The dnsmasq init script code has been corrected to obtain the correct PID when calling the "stop", "restart", and "condrestart" commands. As a result, if there are dnsmasq instances running in addition to the system one started by the init script, then by calling "service dnsmasq" with "stop" or "restart" only the system one is stopped or restarted. (BZ#850944)
-
When two or more dnsmasq processes were running with DHCP enabled on one interface, DHCP RELEASE packets were sometimes lost. Consequently, when two or more dnsmasq processes were running with DHCP enabled on one interface, releasing IP addresses sometimes failed. This update sets the SO_BINDTODEVICE socket option on DHCP sockets if running dnsmasq with DHCP enabled on one interface. As a result, when two or more dnsmasq processes are running with DHCP enabled on one interface, they can release IP addresses as expected. (BZ#887156)
All users of dnsmasq are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
833033 - CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks 850944 - "service dnsmasq restart (or dnsmasq package update) kills all instances of dnsmasq on system, including those started by libvirtd 884957 - guest can not get NAT IP from dnsmasq-2.48-10
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-2.48-13.el6.i686.rpm dnsmasq-debuginfo-2.48-13.el6.i686.rpm
x86_64: dnsmasq-2.48-13.el6.x86_64.rpm dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-debuginfo-2.48-13.el6.i686.rpm dnsmasq-utils-2.48-13.el6.i686.rpm
x86_64: dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm dnsmasq-utils-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
x86_64: dnsmasq-2.48-13.el6.x86_64.rpm dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
x86_64: dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm dnsmasq-utils-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-2.48-13.el6.i686.rpm dnsmasq-debuginfo-2.48-13.el6.i686.rpm
ppc64: dnsmasq-2.48-13.el6.ppc64.rpm dnsmasq-debuginfo-2.48-13.el6.ppc64.rpm
s390x: dnsmasq-2.48-13.el6.s390x.rpm dnsmasq-debuginfo-2.48-13.el6.s390x.rpm
x86_64: dnsmasq-2.48-13.el6.x86_64.rpm dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-debuginfo-2.48-13.el6.i686.rpm dnsmasq-utils-2.48-13.el6.i686.rpm
ppc64: dnsmasq-debuginfo-2.48-13.el6.ppc64.rpm dnsmasq-utils-2.48-13.el6.ppc64.rpm
s390x: dnsmasq-debuginfo-2.48-13.el6.s390x.rpm dnsmasq-utils-2.48-13.el6.s390x.rpm
x86_64: dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm dnsmasq-utils-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-2.48-13.el6.i686.rpm dnsmasq-debuginfo-2.48-13.el6.i686.rpm
x86_64: dnsmasq-2.48-13.el6.x86_64.rpm dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm
i386: dnsmasq-debuginfo-2.48-13.el6.i686.rpm dnsmasq-utils-2.48-13.el6.i686.rpm
x86_64: dnsmasq-debuginfo-2.48-13.el6.x86_64.rpm dnsmasq-utils-2.48-13.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-3411.html https://access.redhat.com/security/updates/classification/#moderate https://rhn.redhat.com/errata/RHSA-2013-0276.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFRJbynXlSAg2UNWIIRAvO7AKC9DX720FbYDvxil9RlNiiZHmN2TQCglV5s c8EDGXAb588QM/PyzO8J+9A= =GXp0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 6) - x86_64
- Description:
The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. This update includes the changes necessary to call dnsmasq with a new command line option, which was introduced to dnsmasq via RHSA-2013:0277. Space precludes documenting all of these changes in this advisory. After installing the updated packages, libvirtd must be restarted ("service libvirtd restart") for this update to take effect. Bugs fixed (http://bugzilla.redhat.com/):
695394 - default migration speed is too low for guests with heavy IO
713922 - virsh man page refers to unspecified "documentation"
724893 - RFE: better message when start the guest which CPU comprises flags that host doesn't support
770285 - cpu-compare fails inside virtualized hosts
770795 - blkioParameters doesn't work
770830 - --config doesn't work correctly for blkiotune option --device-weight
771424 - RFE: Resident Set Size (RSS) limits on qemu guests
772290 - RFE: Configurable VNC start port or ability to exclude use of specific ports
787906 - [python binding] migrateGetMaxSpeed did not work right with parameters
789327 - [RFE] Resume VM from s3 as a response for monitor/keyboard/mouse action
798467 - libvirt doesn't validate a manually specified MAC address for a KVM guest
799986 - libvirtd should explicitly check for existance of configured sanlock directory before trying to register lockspace
801772 - RFE: Use scsi-hd, scsi-cd instead of scsi-disk
803577 - virsh attach-disk should detect disk source file type when sourcetype is not specified
804601 - Controllers do not support virsh attach/detach-device --persistent
805071 - RFE : Dynamically change the host network/bridge that is attached to a vNIC
805243 - [RFE] add some mechanism to pre-populate credentials for libvirt connections
805361 - RFE: privnet should work well with lxc
807545 - the programming continue to run when executing virsh snapshot-list with --roots and --from mutually exclusive options
807907 - Tunnelled migration sometimes report error when do scalability test
807996 - libvirtd may hang during tunneled migration
810799 - virsh list and "--managed-save " flag can't list the domains with managed save state
813191 - virt-xml-validate fail for pool, nodedev and capabilities
813735 - Non detection of qemu TCG mode support within a RHEL VM
813819 - Unable to disable sending keep-alive messages
815644 - There is no executable permission on default pool.
816448 - inaccurate display for status of stopped libvirt-guests service
816503 - [RFE] Ability to configure sound pass-through to appear as MIC as opposed to line-in
816609 - [libvirt] python bindings have inconsistent handling of float->int conversion
817219 - Don't allow to define multiple pools with the same target
817239 - dominfo outputs incorrectly for memory unit
817244 - Issues about virsh -h usage
818467 - Improve libvirt debug capability
818996 - [rfe] allow to disable usb & vga altogether
819401 - [LXC] virsh dominfo can't get a correct VCPU number
820173 - Libvirtd fails to initialize sanlock driver
821665 - unclear error message: qemu should report 'lsi' is not supported
822068 - libvirtd will crash when hotplug attah-disk to guest
822340 - There are some typos when virsh connect source guest server with ssh PermitRootLogin disabled
822373 - libvirtd will crash when tight loop of hotplug/unplug PCI device to guest without managed=yes
823362 - vol-create-as should fail when allocate a malformed size image
823765 - libvirt should raise an error when set network with special/invalid MAC address
823850 - find-storage-pool-sources/ find-storage-pool-sources-as can't return XML describing of netfs/iscsi pool
823857 - guest can't start with unable to set security context error if guests are unconfined
824253 - manpage: document limitations on identifying domains with numeric names
825068 - Start a guest with assigned usb device which is used by another guest will reset the label
825108 - unexpected result from virt-pki-validate
825600 - spice client could not disconnect after update graphics with connected='disconnect'
825699 - Can't start pool with uuid and other commands with uuid issue
825820 - Libvirt is missing important hooks
827234 - potential to deadlock libvirt on EPIPE
827380 - Minimum value for nodesuspend time duration need be given in virsh manual or help
827519 - "Unable to determine device index for network device" when attaching new network device to a guest that already has a netdev of type='hostdev'
828023 - [libvirt] Setting numa parameters causes guest xml error
828640 - valgrind defects some use-after-free errors - virsh console
828676 - virt-xml-validate validate fails when xml contains kernel/initrd/cmdline elements
828729 - CPU topology parsing bug on special NUMA platform
829107 - valgrind defects some use-after-free errors - virsh change-media
829246 - virsh detach-disk will be failed with special image name
829562 - virsh attach-disk --cache does not work
830051 - [Doc] virsh doc has error/omission on device commands and nodedev commands
830057 - man doc of vol-create-as format is lack of qed and vmdk
831044 - #libvirtd error messages should be fixed
831049 - Update libvirtd manpage to describe how --timeout works & its usage limitations
831099 - add the ability to set a wwn for SCSI disks
831149 - virt-manager causes iowait, due to rewriting XML files repeatable
832004 - vncdisplay can't output default ip address for the vnc display
832081 - Fix keepalive issues in libvirt
832156 - RFE: Support customizable actions when sanlock leases are lost
832302 - libvirt shouldn't delete an existing unregistered volume in vol-create
832309 - [Doc]Problems about manual and help of virsh desc command
832329 - [Doc]Problems about help of virsh domiftune command
832372 - [Doc]Problems about manual and help of virsh dompmsuspend command
833327 - [Doc]The abbreviation of domain name-id-uuid arguments are inconsistent in manual
833674 - Deactivate memory balloon with type of none get wrong error info
834365 - Improve error message when trying to change VM's processor count to 0
834927 - virConnectDomainEventRegisterAny won't register the same callback for the same event but for different domains
835782 - when create the netfs pool, virsh pool-create-as do not remount the target dir which is mounted for another device firstly.
836135 - spice migration: prevent race with libvirt
837466 - virsh report error when quit virsh connection
837470 - libvirtd crash when virsh find-storage-pool-sources
837485 - can not start vdsmd service after update the libvirt packages
837542 - [regression]can't undefine guest after guest saved.
837544 - snapshot-list return core dumped
837761 - [Doc] Inaccurate description about force option in change-media help
837884 - per-machine-type CPU models for safe migration
839537 - Error occurs when given hard_limit in memtune more than current swap_hard_limit
839557 - [Doc]Need to explain in manual that the output memory of memtune command may be rounded
839661 - libvirt: support QMP event for S4
839930 - There is no message if debug level number is out of scope when run a virsh command with -d option
842208 - "Segmentation fault" when use virsh command with vdsm installed
842272 - include-passwd option can't worked when using domdisplay.
842557 - libvirt doesn't check ABI compatibility of watchdog and channel fully
842966 - [snapshot] snapshot-info report unknow procedure error even snapshot-info works well
842979 - [Regression] lxc domain fail to start due to not exist cgroup dir
843324 - snapshot-edit will report error message but return 0 when do not update xml
843372 - disk-only snapshot create external file even if snapshot command failed
843560 - Add live migration support for USB
843716 - The libvirtd deamon was killed abnormally when i destroy a domain which was in creating process
844266 - Fail to modify the domain xml with saved file
844408 - after failed hotplug qemu keeps the file descriptor open
845448 - [blockcopy]sometimes Ctrl+C can't terminate blockcopy when use --wait with other options
845460 - exit console will crash libvirtd
845468 - snapshot-list --descendants --from will core dumped
845521 - Plug memory leak after escaping sequence for console
845523 - Use after free when escaping sequence for console
845635 - Return a specific error when qemu-ga is missing or unusable during a live snapshot (quiesce)
845893 - Double close of FD when failing to connect to a remote hypervisor
845958 - libvirt domain event handler can not catch domain pmsuspend and get error when pmwakeup
845966 - libvirt pmsuspend to disk will crash libvirtd
845968 - numatune command can't handle nodeset with '^' for excluding a node
846265 - virsh blkdeviotune fail
846629 - Failed to run cpu-stats when cpuacct.usage_percpu is too large
846639 - Should forbid suspend&resume operate when guest in pmsuspend status.
848648 - [Doc] Add annotation about how to enable stack traces in log messages
851391 - Throw out "DBus support" error in libvirtd.log when restart libvirtd
851395 - xml parse error occur after upgrade to the newest package
851397 - can not start guest in rhevm
851423 - virsh segmentation fault when using find-storage-pool-sources
851452 - unexpected result of virsh save when stop libvirtd
851491 - Libvirtd crash when set "security_default_confined = 0" in qemu.conf
851959 - cpuset can be set in two places.
851963 - Guest will be undefined if remove channel content
851981 - The migration with macvtap network was denied by the target when i set "setenforce 1" in the target
852260 - AFFECT_CURRENT flag does not work well in set_scheduler_parameters when domain is shutoff
852383 - libvirtd dead when start a domain with openvswitch interface
852592 - libvirtd will be crashed when run vcpupin more than once
852668 - libvirt got security label parse error with xml
852675 - [Graphical framebuffer] update device with connected parameter "fail", guest's xml changed
852984 - virsh start command will be hung with openvswitch network interface
853002 - [qemu-ga]shutdown guest by qemu-guest-agent will successful but report error
853043 - guest can't start with unable to set security context error if guests are unconfined
853342 - [doc]There are some typos in CPU Tuning part of the formatdomain.html
853567 - Request for taking fix for PF shutdown in 802.1Qbh
853821 - virsh reboot with 'agent' shutdown mode will hang
853925 - [configuration][doc] set security_driver in qemu.conf
853930 - It is failed to start guest when the number of vcpu is different between
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201303-0027", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dnsmasq", "scope": "lte", "trust": 1.0, "vendor": "thekelleys", "version": "2.62" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "dnsmasq", "scope": "lt", "trust": 0.8, "vendor": "thekelleys", "version": "2.63test1" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.62" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.57" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.59" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.56" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.54" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.55" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.60" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.61" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": "2.58" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.6, "vendor": "thekelleys", "version": null }, { "model": "hat enterprise virtualization hypervisor for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "60" }, { "model": "hat enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.29" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.22" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.21" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.20" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.19" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.50" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.49" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.48" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.47" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.46" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.45" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.44" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.43" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.42" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.41" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.40" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.35" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "dnsmasq", "version": "2.30" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" } ], "sources": [ { "db": "BID", "id": "54353" }, { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "CNNVD", "id": "CNNVD-201207-080" }, { "db": "NVD", "id": "CVE-2012-3411" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:thekelleys:dnsmasq", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001750" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Woodhouse", "sources": [ { "db": "BID", "id": "54353" }, { "db": "CNNVD", "id": "CNNVD-201207-080" } ], "trust": 0.9 }, "cve": "CVE-2012-3411", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-3411", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3411", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3411", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201207-080", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "CNNVD", "id": "CNNVD-201207-080" }, { "db": "NVD", "id": "CVE-2012-3411" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query. Dnsmasq is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to cause denial-of-service conditions through a stream of spoofed DNS queries producing large results. \nDnsmasq versions 2.62 and prior are vulnerable. Relevant releases/architectures:\n\nRHEV Hypervisor for RHEL-6 - noarch\n\n3. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. \n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions. \n\nA flaw was found in the way the vhost kernel module handled descriptors\nthat spanned multiple regions. A privileged guest user could use this flaw\nto crash the host or, potentially, escalate their privileges on the host. \n(CVE-2013-0311)\n\nIt was found that the default SCSI command filter does not accommodate\ncommands that overlap across device classes. A privileged guest user could\npotentially use this flaw to write arbitrary data to a LUN that is\npassed-through as read-only. Now, the VDSM version\ncompatibility is considered and the upgrade message only displays if there\nis an upgrade relevant to the host available. As a result, virtual machines with\nsupported CPU models were not being properly parsed by libvirt and failed\nto start. Virtual machines now start normally. This allows for multiple versions of the hypervisor\npackage to be installed on a system concurrently without making changes to\nthe yum configuration as was previously required. Bugs fixed (http://bugzilla.redhat.com/):\n\n833033 - CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks\n835162 - rhev-hypervisor 6.4 release\n853092 - rhev-h: supported vdsm compatibility versions should be supplied along with rhev-h ISOs\n863579 - RFE: Support installonlypkgs functionality for rhev-hypervisor packages\n875360 - CVE-2012-4542 kernel: block: default SCSI command filter does not accomodate commands overlap across device classes\n912905 - CVE-2013-0311 kernel: vhost: fix length for cross region descriptor\n\n6. packets that should not be passed in) may be sent to the dnsmasq\n application and processed. This can result in DNS amplification\n attacks for example (CVE-2012-3411). It was found that after the upstream patch for\n CVE-2012-3411 issue was applied, dnsmasq still:\n \n - replied to remote TCP-protocol based DNS queries (UDP protocol\n ones were corrected, but TCP ones not) from prohibited networks,\n when the --bind-dynamic option was used,\n \n - when --except-interface lo option was used dnsmasq didn\u0026#039;t answer\n local or remote UDP DNS queries, but still allowed TCP protocol based\n DNS queries,\n \n - when --except-interface lo option was not used local / remote TCP\n DNS queries were also still answered by dnsmasq. \n \n This update fix these three cases. The verification\n of md5 checksums and GPG signatures is performed automatically for you. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFRYvSNmqjQ0CJFipgRAmDuAKDqB4WerX13N+7g/zR6iU5C6b8QjACdEdEW\nkoGb8Voa5rhgjjRVCT1ZvBg=\n=VQ4h\n-----END PGP SIGNATURE-----\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201406-24\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Dnsmasq: Denial of Service\n Date: June 25, 2014\n Bugs: #436894, #453170\n ID: 201406-24\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA vulnerability in Dnsmasq can lead to a Denial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/dnsmasq-2.66\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-3411\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411\n[ 2 ] CVE-2013-0198\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201406-24.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: dnsmasq security, bug fix and enhancement update\nAdvisory ID: RHSA-2013:0277-02\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2013-0277.html\nIssue date: 2013-02-21\nCVE Names: CVE-2012-3411 \n=====================================================================\n\n1. Summary:\n\nUpdated dnsmasq packages that fix one security issue, one bug, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nIt was discovered that dnsmasq, when used in combination with certain\nlibvirtd configurations, could incorrectly process network packets from\nnetwork interfaces that were intended to be prohibited. (CVE-2012-3411)\n\nIn order to fully address this issue, libvirt package users are advised to\ninstall updated libvirt packages. Refer to RHSA-2013:0276 for additional\ninformation. \n\nThis update also fixes the following bug:\n\n* Due to a regression, the lease change script was disabled. Consequently,\nthe \"dhcp-script\" option in the /etc/dnsmasq.conf configuration file did\nnot work. This update corrects the problem and the \"dhcp-script\" option now\nworks as expected. (BZ#815819)\n\nThis update also adds the following enhancements:\n\n* Prior to this update, dnsmasq did not validate that the tftp directory\ngiven actually existed and was a directory. Consequently, configuration\nerrors were not immediately reported on startup. This update improves the\ncode to validate the tftp root directory option. As a result, fault finding\nis simplified especially when dnsmasq is called by external processes such\nas libvirt. (BZ#824214)\n\n* The dnsmasq init script used an incorrect Process Identifier (PID) in the\n\"stop\", \"restart\", and \"condrestart\" commands. Consequently, if there were\nsome dnsmasq instances running besides the system one started by the init\nscript, then repeated calling of \"service dnsmasq\" with \"stop\" or \"restart\"\nwould kill all running dnsmasq instances, including ones not started with\nthe init script. The dnsmasq init script code has been corrected to obtain\nthe correct PID when calling the \"stop\", \"restart\", and \"condrestart\"\ncommands. As a result, if there are dnsmasq instances running in addition\nto the system one started by the init script, then by calling \"service\ndnsmasq\" with \"stop\" or \"restart\" only the system one is stopped or\nrestarted. (BZ#850944)\n\n* When two or more dnsmasq processes were running with DHCP enabled on one\ninterface, DHCP RELEASE packets were sometimes lost. Consequently, when two\nor more dnsmasq processes were running with DHCP enabled on one interface,\nreleasing IP addresses sometimes failed. This update sets the\nSO_BINDTODEVICE socket option on DHCP sockets if running dnsmasq with DHCP\nenabled on one interface. As a result, when two or more dnsmasq processes\nare running with DHCP enabled on one interface, they can release IP\naddresses as expected. (BZ#887156)\n\nAll users of dnsmasq are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n833033 - CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks\n850944 - \"service dnsmasq restart (or dnsmasq package update) kills all instances of dnsmasq on system, including those started by libvirtd\n884957 - guest can not get NAT IP from dnsmasq-2.48-10\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-2.48-13.el6.i686.rpm\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\n\nx86_64:\ndnsmasq-2.48-13.el6.x86_64.rpm\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\ndnsmasq-utils-2.48-13.el6.i686.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\ndnsmasq-utils-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\nx86_64:\ndnsmasq-2.48-13.el6.x86_64.rpm\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\ndnsmasq-utils-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-2.48-13.el6.i686.rpm\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\n\nppc64:\ndnsmasq-2.48-13.el6.ppc64.rpm\ndnsmasq-debuginfo-2.48-13.el6.ppc64.rpm\n\ns390x:\ndnsmasq-2.48-13.el6.s390x.rpm\ndnsmasq-debuginfo-2.48-13.el6.s390x.rpm\n\nx86_64:\ndnsmasq-2.48-13.el6.x86_64.rpm\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\ndnsmasq-utils-2.48-13.el6.i686.rpm\n\nppc64:\ndnsmasq-debuginfo-2.48-13.el6.ppc64.rpm\ndnsmasq-utils-2.48-13.el6.ppc64.rpm\n\ns390x:\ndnsmasq-debuginfo-2.48-13.el6.s390x.rpm\ndnsmasq-utils-2.48-13.el6.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\ndnsmasq-utils-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-2.48-13.el6.i686.rpm\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\n\nx86_64:\ndnsmasq-2.48-13.el6.x86_64.rpm\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dnsmasq-2.48-13.el6.src.rpm\n\ni386:\ndnsmasq-debuginfo-2.48-13.el6.i686.rpm\ndnsmasq-utils-2.48-13.el6.i686.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.48-13.el6.x86_64.rpm\ndnsmasq-utils-2.48-13.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-3411.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://rhn.redhat.com/errata/RHSA-2013-0276.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2013 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFRJbynXlSAg2UNWIIRAvO7AKC9DX720FbYDvxil9RlNiiZHmN2TQCglV5s\nc8EDGXAb588QM/PyzO8J+9A=\n=GXp0\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 6) - x86_64\n\n3. Description:\n\nThe libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. This update\nincludes the changes necessary to call dnsmasq with a new command line\noption, which was introduced to dnsmasq via RHSA-2013:0277. \nSpace precludes documenting all of these changes in this advisory. After installing the\nupdated packages, libvirtd must be restarted (\"service libvirtd restart\")\nfor this update to take effect. Bugs fixed (http://bugzilla.redhat.com/):\n\n695394 - default migration speed is too low for guests with heavy IO\n713922 - virsh man page refers to unspecified \"documentation\"\n724893 - RFE: better message when start the guest which CPU comprises flags that host doesn\u0027t support\n770285 - cpu-compare fails inside virtualized hosts\n770795 - blkioParameters doesn\u0027t work\n770830 - --config doesn\u0027t work correctly for blkiotune option --device-weight\n771424 - RFE: Resident Set Size (RSS) limits on qemu guests\n772290 - RFE: Configurable VNC start port or ability to exclude use of specific ports\n787906 - [python binding] migrateGetMaxSpeed did not work right with parameters\n789327 - [RFE] Resume VM from s3 as a response for monitor/keyboard/mouse action\n798467 - libvirt doesn\u0027t validate a manually specified MAC address for a KVM guest\n799986 - libvirtd should explicitly check for existance of configured sanlock directory before trying to register lockspace\n801772 - RFE: Use scsi-hd, scsi-cd instead of scsi-disk\n803577 - virsh attach-disk should detect disk source file type when sourcetype is not specified\n804601 - Controllers do not support virsh attach/detach-device --persistent\n805071 - RFE : Dynamically change the host network/bridge that is attached to a vNIC\n805243 - [RFE] add some mechanism to pre-populate credentials for libvirt connections\n805361 - RFE: privnet should work well with lxc\n807545 - the programming continue to run when executing virsh snapshot-list with --roots and --from mutually exclusive options\n807907 - Tunnelled migration sometimes report error when do scalability test\n807996 - libvirtd may hang during tunneled migration\n810799 - virsh list and \"--managed-save \" flag can\u0027t list the domains with managed save state\n813191 - virt-xml-validate fail for pool, nodedev and capabilities\n813735 - Non detection of qemu TCG mode support within a RHEL VM\n813819 - Unable to disable sending keep-alive messages\n815644 - There is no executable permission on default pool. \n816448 - inaccurate display for status of stopped libvirt-guests service\n816503 - [RFE] Ability to configure sound pass-through to appear as MIC as opposed to line-in\n816609 - [libvirt] python bindings have inconsistent handling of float-\u003eint conversion\n817219 - Don\u0027t allow to define multiple pools with the same target\n817239 - dominfo outputs incorrectly for memory unit\n817244 - Issues about virsh -h usage\n818467 - Improve libvirt debug capability\n818996 - [rfe] allow to disable usb \u0026 vga altogether\n819401 - [LXC] virsh dominfo can\u0027t get a correct VCPU number\n820173 - Libvirtd fails to initialize sanlock driver\n821665 - unclear error message: qemu should report \u0027lsi\u0027 is not supported\n822068 - libvirtd will crash when hotplug attah-disk to guest\n822340 - There are some typos when virsh connect source guest server with ssh PermitRootLogin disabled\n822373 - libvirtd will crash when tight loop of hotplug/unplug PCI device to guest without managed=yes\n823362 - vol-create-as should fail when allocate a malformed size image\n823765 - libvirt should raise an error when set network with special/invalid MAC address\n823850 - find-storage-pool-sources/ find-storage-pool-sources-as can\u0027t return XML describing of netfs/iscsi pool\n823857 - guest can\u0027t start with unable to set security context error if guests are unconfined\n824253 - manpage: document limitations on identifying domains with numeric names\n825068 - Start a guest with assigned usb device which is used by another guest will reset the label\n825108 - unexpected result from virt-pki-validate\n825600 - spice client could not disconnect after update graphics with connected=\u0027disconnect\u0027\n825699 - Can\u0027t start pool with uuid and other commands with uuid issue\n825820 - Libvirt is missing important hooks\n827234 - potential to deadlock libvirt on EPIPE\n827380 - Minimum value for nodesuspend time duration need be given in virsh manual or help\n827519 - \"Unable to determine device index for network device\" when attaching new network device to a guest that already has a netdev of type=\u0027hostdev\u0027\n828023 - [libvirt] Setting numa parameters causes guest xml error\n828640 - valgrind defects some use-after-free errors - virsh console\n828676 - virt-xml-validate validate fails when xml contains kernel/initrd/cmdline elements\n828729 - CPU topology parsing bug on special NUMA platform\n829107 - valgrind defects some use-after-free errors - virsh change-media\n829246 - virsh detach-disk will be failed with special image name\n829562 - virsh attach-disk --cache does not work\n830051 - [Doc] virsh doc has error/omission on device commands and nodedev commands\n830057 - man doc of vol-create-as format is lack of qed and vmdk\n831044 - #libvirtd error messages should be fixed\n831049 - Update libvirtd manpage to describe how --timeout works \u0026 its usage limitations\n831099 - add the ability to set a wwn for SCSI disks\n831149 - virt-manager causes iowait, due to rewriting XML files repeatable\n832004 - vncdisplay can\u0027t output default ip address for the vnc display\n832081 - Fix keepalive issues in libvirt\n832156 - RFE: Support customizable actions when sanlock leases are lost\n832302 - libvirt shouldn\u0027t delete an existing unregistered volume in vol-create\n832309 - [Doc]Problems about manual and help of virsh desc command\n832329 - [Doc]Problems about help of virsh domiftune command\n832372 - [Doc]Problems about manual and help of virsh dompmsuspend command\n833327 - [Doc]The abbreviation of domain name-id-uuid arguments are inconsistent in manual\n833674 - Deactivate memory balloon with type of none get wrong error info\n834365 - Improve error message when trying to change VM\u0027s processor count to 0\n834927 - virConnectDomainEventRegisterAny won\u0027t register the same callback for the same event but for different domains\n835782 - when create the netfs pool, virsh pool-create-as do not remount the target dir which is mounted for another device firstly. \n836135 - spice migration: prevent race with libvirt\n837466 - virsh report error when quit virsh connection\n837470 - libvirtd crash when virsh find-storage-pool-sources\n837485 - can not start vdsmd service after update the libvirt packages\n837542 - [regression]can\u0027t undefine guest after guest saved. \n837544 - snapshot-list return core dumped\n837761 - [Doc] Inaccurate description about force option in change-media help\n837884 - per-machine-type CPU models for safe migration\n839537 - Error occurs when given hard_limit in memtune more than current swap_hard_limit\n839557 - [Doc]Need to explain in manual that the output memory of memtune command may be rounded\n839661 - libvirt: support QMP event for S4\n839930 - There is no message if debug level number is out of scope when run a virsh command with -d option\n842208 - \"Segmentation fault\" when use virsh command with vdsm installed\n842272 - include-passwd option can\u0027t worked when using domdisplay. \n842557 - libvirt doesn\u0027t check ABI compatibility of watchdog and channel fully\n842966 - [snapshot] snapshot-info report unknow procedure error even snapshot-info works well\n842979 - [Regression] lxc domain fail to start due to not exist cgroup dir\n843324 - snapshot-edit will report error message but return 0 when do not update xml\n843372 - disk-only snapshot create external file even if snapshot command failed\n843560 - Add live migration support for USB\n843716 - The libvirtd deamon was killed abnormally when i destroy a domain which was in creating process\n844266 - Fail to modify the domain xml with saved file\n844408 - after failed hotplug qemu keeps the file descriptor open\n845448 - [blockcopy]sometimes Ctrl+C can\u0027t terminate blockcopy when use --wait with other options\n845460 - exit console will crash libvirtd\n845468 - snapshot-list --descendants --from will core dumped\n845521 - Plug memory leak after escaping sequence for console\n845523 - Use after free when escaping sequence for console\n845635 - Return a specific error when qemu-ga is missing or unusable during a live snapshot (quiesce)\n845893 - Double close of FD when failing to connect to a remote hypervisor\n845958 - libvirt domain event handler can not catch domain pmsuspend and get error when pmwakeup\n845966 - libvirt pmsuspend to disk will crash libvirtd\n845968 - numatune command can\u0027t handle nodeset with \u0027^\u0027 for excluding a node\n846265 - virsh blkdeviotune fail\n846629 - Failed to run cpu-stats when cpuacct.usage_percpu is too large\n846639 - Should forbid suspend\u0026resume operate when guest in pmsuspend status. \n848648 - [Doc] Add annotation about how to enable stack traces in log messages\n851391 - Throw out \"DBus support\" error in libvirtd.log when restart libvirtd\n851395 - xml parse error occur after upgrade to the newest package\n851397 - can not start guest in rhevm\n851423 - virsh segmentation fault when using find-storage-pool-sources\n851452 - unexpected result of virsh save when stop libvirtd\n851491 - Libvirtd crash when set \"security_default_confined = 0\" in qemu.conf\n851959 - cpuset can be set in two places. \n851963 - Guest will be undefined if remove channel content\n851981 - The migration with macvtap network was denied by the target when i set \"setenforce 1\" in the target\n852260 - AFFECT_CURRENT flag does not work well in set_scheduler_parameters when domain is shutoff\n852383 - libvirtd dead when start a domain with openvswitch interface\n852592 - libvirtd will be crashed when run vcpupin more than once\n852668 - libvirt got security label parse error with xml\n852675 - [Graphical framebuffer] update device with connected parameter \"fail\", guest\u0027s xml changed\n852984 - virsh start command will be hung with openvswitch network interface\n853002 - [qemu-ga]shutdown guest by qemu-guest-agent will successful but report error\n853043 - guest can\u0027t start with unable to set security context error if guests are unconfined\n853342 - [doc]There are some typos in CPU Tuning part of the formatdomain.html\n853567 - Request for taking fix for PF shutdown in 802.1Qbh\n853821 - virsh reboot with \u0027agent\u0027 shutdown mode will hang\n853925 - [configuration][doc] set security_driver in qemu.conf\n853930 - It is failed to start guest when the number of vcpu is different between \u003cvcpu\u003e and \u003ccputune/\u003e\n854133 - libvirt should check the range of emulator_period and emulator_quota when set them with --config\n854135 - The libvirt domain event handler can\u0027t catch the disconnecting information when disconnected the guest\n855218 - Problems on CPU tuning\n855237 - [libvirt] Add a new boot parameter to set the delay time before rebooting\n855783 - improve error message for secret-get-value\n856247 - full RHEL 6.4 block-copy support\n856489 - Modify target type of channel element from \u0027virtio\u0027 to \u0027guestfwd\u0027 will cause libvirtd crash\n856528 - List option --state-shutoff should filter guest properly\n856864 - Do live migration from rhel6.1.z release version to rhel6.4 newest version and back will get \"error Unknown controller type \u0027usb\u0027\"\n856950 - Deadlock on libvirt when playing with hotplug and add/remove vm\n856951 - The value of label is wrong with static dac model in xml\n857013 - Failed to run cpu-stats after vcpu hotplug\n857341 - fail to start lxc domain\n857367 - destroy default virtual network throw error in libvirtd.log\n858204 - The libvirt augeas lens can\u0027t parse a libvirtd.conf file where host_uuid is present\n859320 - libvirt auth.conf make virsh cmd Segmentation fault (core dumped)\n859331 - Create new guest fail with usermode\n859712 - [libvirt] Deadlock in libvirt after storage is blocked\n860519 - security: support for names on DAC labels\n860907 - It reported an error when checked the schedinfo of the lxc guest\n860971 - There should be a comma between \"kvmclock\" and \"kvm_pv_eoi\" in qemu-kvm cmd generated by libvirt\n861564 - fail to start lxc os container\n863059 - Unable to migrate guest: internal error missing hostuuid element in migration data\n863115 - libvirt calls \u0027qemu-kvm -help\u0027 too often\n864097 - Cannot start domains with custom CPU model\n864122 - virtualport parameter profileid in a \u003cnetwork\u003e or \u003cportgroup\u003e causes failure to initialize guest interface\n864336 - [LXC] destroy domain will hang after restart libvirtd\n864384 - virsh list get error msg when connect ESXi5.0 server\n865670 - Warning messages \"Found untested VI API major/minor version 5.1\" show when connect to esx5.1 server\n866288 - libvirtd crashes when both \u003cboot dev=\u0027...\u0027/\u003e and \u003cboot order=\u0027...\u0027/\u003e are used in one domain XML\n866364 - libvirtd crash when edit a net with some operation\n866369 - libvirt: terminating vm on signal 15 when hibernate fails on ENOSPACE\n866388 - libvirt: no event is sent to vdsm in case vm is terminated on signal 15 after hibernate failure\n866508 - Fail to import libvirt python module due to \u0027undefined symbol: libssh2_agent_free\u0027\n866524 - use-after-free on virsh node-memory-tune\n866999 - CPU topology is missing in capabilities XML when libvirt fails to detect host CPU model\n867246 - [LXC] A running guest will be stopped after restarting libvirtd service\n867372 - Can not change affinity of domain process with \"cpuset \"of \u003cvcpu\u003e element. \n867412 - libvirt fails to clear async job when p2p migration fails early\n867724 - Libvirt sometimes fails to wait on spice to migrate\n867764 - default machine type is detected incorrectly\n868389 - virsh net-update to do a live add of a static host to a network that previously had no static hosts, reports success, but doesn\u0027t take effect until network is restarted. \n868483 - multiple default portgroups erroneously allowed in network definitions\n868692 - Libvirt: Double dash in VM causes it to disappear - bad parsing of XML\n869096 - Vcpuinfo don\u0027t return numa\u0027s CPU Affinity properly on mutiple numa node\u0027s machine\n869100 - poor error message for virsh snapshot-list --roots --current\n869508 - the option --flags of virsh nodesuspend command should be removed\n869557 - Can\u0027t add more than 256 logical networks\n870099 - virsh emulatorpin still can work when vcpu placement is \"auto\". \n870273 - coding errors in virsh man page\n871055 - libvirt should support both upstream and RHEL drive-mirror\n871201 - If libvirt is restarted after updating dnsmasq or radvd packages, a subsequent \"virsh net-destroy\" will fail to kill the dnsmasq/radvd processes\n871312 - emulatorpin affinity isn\u0027t the same as Cpus_allowed_list of emulator \u0027 thread when cpuset is specified\n872104 - wrong description of net-update option(config, live and current)\n872656 - virNodeGetMemoryParameters is broken on older kernels\n873134 - setting current memory equal to max will end with domain start as current \u003e max\n873537 - virsh save will crash libvirtd sometimes\n873538 - [Regression] Define domain failed in ESX5.1\n873792 - libvirt: cancel migration is sent but migration continues\n873934 - Failed to run Coverity on libvirt RHEL source rpm\n874050 - virsh nodeinfo can\u0027t get the right info on AMD Bulldozer cpu\n874171 - virsh should make external checkpoint creation easy\n874330 - First autostarted guest has always id 1\n874549 - libvirt_lxc segfaults when staring lxc through openstack\n874702 - CVE-2012-3411 libvirt needs to use new dnsmasq option to avoid open DNS proxy\n874860 - libvirt fails to start if storage pool contains image with missing backing file\n876415 - virDomainGetVcpuPinInfo might fail to show right CPU affinity setting\n876816 - libvirt should allow disk-only (external) snapshots of offline VMs\n876817 - virsh should make it easier to filter snapshots by type\n876828 - the qcow2 disk\u0027s major:minor number still exists in guest\u0027s devices.list after hot-unplug\n876868 - virsh save guest with an no-exist xml should show error msg\n877095 - libvirt doesn\u0027t clean up open files for device assignment\n877303 - virsh snapshot-edit prints garbage with wrong parameters\n878376 - Coverity scan founds some resource leaks and USE_AFTER_FREE\n878400 - virsh pool-destroy should fail with error info when pool is in using\n878779 - domdisplay with --include-password can\u0027t display VNC passwor\n878862 - NULL pointer usage when starting guest with broken image chain\n879130 - there is not error message when create external checkpoint with --memspec= (NULL)\n879132 - create external checkpoint sometimes will crash libvirtd\n879360 - Libvirt leaks libvirt_lxc processes on container shutdown\n879473 - net-update may cause libvirtd crash when modify portgroup\n879780 - vol-clone failed to clone LVM volumes\n880064 - [LXC] libvirt_lxc segfaults when staring lxc guest\n880919 - Libvirtd crashed while saving the guest to a nonexistent directory\n881480 - virDomainUpdateDeviceFlags fails when interface type is \u0027network\u0027\n882915 - virsh doesn\u0027t report error if updated data argument for command \"schedinfo\" is invalid\n883832 - Cannot start VMs after upgrade from 6.3 to libvirt-0.10.2-10\n884650 - Add support for qemu-kvm\u0027s BALLOON_CHANGE event to avoid using monitor in virDomainGetXMLDesc\n885081 - Invalid job handling while restarting CPUs when creating external snapshot\n885727 - Libvirt won\u0027t parse dnsmasq capabilities when debug logs are enabled\n885838 - improper errors logged when changing the bridge device used by a domain \u003cinterface type=\u0027bridge\u0027\u003e\n886821 - libvirt-launched dnsmasq listens on localhost when it shouldn\u0027t\n886933 - High disk usage when both libvirt and virt-manager are opened\n887187 - [Doc] There are some typos in libvirt manual and formatdomain.html\n888426 - block-copy pivot fails complaining that job is not active\n889319 - support for IFLA_EXT_MASK and RTEXT_FILTER_VF needs to be added to lib\n889407 - snapshot --redefine disk snapshot may cause libvirtd crash\n891653 - Cgroups memory limit are causing the virt to be terminated unexpectedly\n894085 - libvirt: vm pauses after live storage migration\n896403 - delete snapshot which name contain \u0027/\u0027 lead to libvirtd crash\n\n6", "sources": [ { "db": "NVD", "id": "CVE-2012-3411" }, { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "BID", "id": "54353" }, { "db": "PACKETSTORM", "id": "120587" }, { "db": "PACKETSTORM", "id": "121148" }, { "db": "PACKETSTORM", "id": "127218" }, { "db": "PACKETSTORM", "id": "120459" }, { "db": "PACKETSTORM", "id": "120454" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3411", "trust": 3.2 }, { "db": "BID", "id": "54353", "trust": 1.9 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2012/07/12/5", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-001750", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201207-080", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "120587", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121148", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127218", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120459", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "120454", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "54353" }, { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "PACKETSTORM", "id": "120587" }, { "db": "PACKETSTORM", "id": "121148" }, { "db": "PACKETSTORM", "id": "127218" }, { "db": "PACKETSTORM", "id": "120459" }, { "db": "PACKETSTORM", "id": "120454" }, { "db": "CNNVD", "id": "CNNVD-201207-080" }, { "db": "NVD", "id": "CVE-2012-3411" } ] }, "id": "VAR-201303-0027", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25396827 }, "last_update_date": "2024-11-23T19:49:24.541000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "#683372", "trust": 0.8, "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "title": "Bug 833033", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "title": "RHSA-2013:0276", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "title": "RHSA-2013:0277", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "title": "Don\u0027t elide code needed for --bind-dynamic if compiled without IPv6.", "trust": 0.8, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=2f38141f434e23292f84cefc33e8de76fb856147" }, { "title": "Add --bind-dynamic v2.63test1", "trust": 0.8, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "title": "CHANGELOG", "trust": 0.8, "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "title": "dnsmasq-2.66test2", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=45660" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "CNNVD", "id": "CNNVD-201207-080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-3411" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2013-0276.html" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2013-0579.html" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2013-0277.html" }, { "trust": 1.6, "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "trust": 1.6, "url": "http://www.thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 1.6, "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:072" }, { "trust": 1.6, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commitdiff%3bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/54353" }, { "trust": 1.6, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commitdiff%3bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3411" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3411" }, { "trust": 0.6, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=2f38141f434e23292f84cefc33e8de76fb856147" }, { "trust": 0.6, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3411" }, { "trust": 0.3, "url": "http://www.thekelleys.org.uk/dnsmasq/doc.html" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://www.redhat.com/security/data/cve/cve-2012-3411.html" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.3, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0198" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0311" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-0311.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4542" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/docs/en-us/red_hat_enterprise_linux/6/html/hypervisor_deployment_guide/chap-deployment_guide-upgrading_red_hat_enterprise_virtualization_hypervisors.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhba-2013-0556.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-4542.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2013-0030" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://wiki.mageia.org/en/support/advisories/mgasa-2012-0273" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0198" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3411" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0198" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201406-24.xml" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/docs/en-us/red_hat_enterprise_linux/6/html/6.4_technical_notes/libvirt.html" } ], "sources": [ { "db": "BID", "id": "54353" }, { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "PACKETSTORM", "id": "120587" }, { "db": "PACKETSTORM", "id": "121148" }, { "db": "PACKETSTORM", "id": "127218" }, { "db": "PACKETSTORM", "id": "120459" }, { "db": "PACKETSTORM", "id": "120454" }, { "db": "CNNVD", "id": "CNNVD-201207-080" }, { "db": "NVD", "id": "CVE-2012-3411" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "54353" }, { "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "db": "PACKETSTORM", "id": "120587" }, { "db": "PACKETSTORM", "id": "121148" }, { "db": "PACKETSTORM", "id": "127218" }, { "db": "PACKETSTORM", "id": "120459" }, { "db": "PACKETSTORM", "id": "120454" }, { "db": "CNNVD", "id": "CNNVD-201207-080" }, { "db": "NVD", "id": "CVE-2012-3411" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-07-09T00:00:00", "db": "BID", "id": "54353" }, { "date": "2013-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "date": "2013-03-01T01:18:37", "db": "PACKETSTORM", "id": "120587" }, { "date": "2013-04-08T21:29:19", "db": "PACKETSTORM", "id": "121148" }, { "date": "2014-06-25T22:49:52", "db": "PACKETSTORM", "id": "127218" }, { "date": "2013-02-21T16:31:24", "db": "PACKETSTORM", "id": "120459" }, { "date": "2013-02-21T16:30:33", "db": "PACKETSTORM", "id": "120454" }, { "date": "2012-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-080" }, { "date": "2013-03-05T21:38:54.753000", "db": "NVD", "id": "CVE-2012-3411" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-16T17:43:00", "db": "BID", "id": "54353" }, { "date": "2013-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-001750" }, { "date": "2023-02-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201207-080" }, { "date": "2024-11-21T01:40:49.047000", "db": "NVD", "id": "CVE-2012-3411" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "120459" }, { "db": "PACKETSTORM", "id": "120454" }, { "db": "CNNVD", "id": "CNNVD-201207-080" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dnsmasq Remote Denial of Service Vulnerability", "sources": [ { "db": "BID", "id": "54353" }, { "db": "CNNVD", "id": "CNNVD-201207-080" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201207-080" } ], "trust": 0.6 } }
gsd-2012-3411
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2012-3411", "description": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "id": "GSD-2012-3411", "references": [ "https://www.suse.com/security/cve/CVE-2012-3411.html", "https://access.redhat.com/errata/RHSA-2013:0579", "https://access.redhat.com/errata/RHSA-2013:0277", "https://access.redhat.com/errata/RHSA-2013:0276", "https://alas.aws.amazon.com/cve/html/CVE-2012-3411.html", "https://linux.oracle.com/cve/CVE-2012-3411.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-3411" ], "details": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "id": "GSD-2012-3411", "modified": "2023-12-13T01:20:20.544589Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2013-0579.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "name": "http://rhn.redhat.com/errata/RHSA-2013-0276.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2013-0277.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147", "refsource": "MISC", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0", "refsource": "MISC", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072" }, { "name": "http://www.openwall.com/lists/oss-security/2012/07/12/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "name": "http://www.securityfocus.com/bid/54353", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/54353" }, { "name": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "MISC", "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=833033", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.62", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3411" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "name": "54353", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/54353" }, { "name": "RHSA-2013:0277", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "name": "[oss-security] 20120712 Re: Re: CVE Request -- dnsmasq: When being run by libvirt open DNS proxy (reachable out-of the virtual network set for the particular guest domain too) is created", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=833033", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "name": "RHSA-2013:0276", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "name": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" }, { "name": "RHSA-2013:0579", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { "name": "MDVSA-2013:072", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147", "refsource": "MISC", "tags": [], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "name": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0", "refsource": "MISC", "tags": [], "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T00:25Z", "publishedDate": "2013-03-05T21:38Z" } } }
ghsa-gj79-j4q7-5h4x
Vulnerability from github
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
{ "affected": [], "aliases": [ "CVE-2012-3411" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-03-05T21:38:00Z", "severity": "MODERATE" }, "details": "Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.", "id": "GHSA-gj79-j4q7-5h4x", "modified": "2022-05-13T01:26:16Z", "published": "2022-05-13T01:26:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3411" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833033" }, { "type": "WEB", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0276.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0277.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0579.html" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=2f38141f434e23292f84cefc33e8de76fb856147" }, { "type": "WEB", "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=54dd393f3938fc0c19088fbd319b95e37d81a2b0" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:072" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/07/12/5" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/54353" }, { "type": "WEB", "url": "http://www.thekelleys.org.uk/dnsmasq/CHANGELOG" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.