Action not permitted
Modal body text goes here.
cve-2007-0537
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24442" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2007:0909", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27108" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24442" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "http://www.kde.org/info/security/advisory-20070206-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "refsource": "OSVDB", "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "https://issues.rpath.com/browse/RPL-1117", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24442" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0537", "datePublished": "2007-01-29T16:00:00", "dateReserved": "2007-01-29T00:00:00", "dateUpdated": "2024-08-07T12:19:30.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-0537\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-01-29T16:28:00.000\",\"lastModified\":\"2024-11-21T00:26:07.630\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.\"},{\"lang\":\"es\",\"value\":\"La biblioteca HTML KDE (kdelibs), como es usado en Konqueror versi\u00f3n 3.5.5, no analiza de manera apropiada los comentarios HTML, lo que permite a los atacantes remotos conducir ataques de tipo Cross-Site Scripting (XSS) y omitir algunos esquemas de protecci\u00f3n XSS mediante la incorporaci\u00f3n de ciertas etiquetas HTML en un comentario en una etiqueta title, un problema relacionado con CVE-2007-0478.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8920C38-1362-48FA-91AB-77E17F43CF82\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/32975\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/23932\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24013\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24065\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24442\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24463\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24889\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27108\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017591\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kde.org/info/security/advisory-20070206-1.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:031\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:157\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_6_sr.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0909.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/457924/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22428\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-420-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0505\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1117\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/32975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24463\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/27108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kde.org/info/security/advisory-20070206-1.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:031\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_6_sr.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0909.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/457924/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/22428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-420-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225414\\n\\nThe Red Hat Security Response Team has rated this issue as having low security\\nimpact, a future update may address this flaw. More information regarding\\nissue severity can be found here:\\nhttp://www.redhat.com/security/updates/classification/\",\"lastModified\":\"2007-02-15T00:00:00\"}]}}" } }
gsd-2007-0537
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-0537", "description": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.", "id": "GSD-2007-0537", "references": [ "https://www.suse.com/security/cve/CVE-2007-0537.html", "https://access.redhat.com/errata/RHSA-2007:0909", "https://linux.oracle.com/cve/CVE-2007-0537.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-0537" ], "details": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.", "id": "GSD-2007-0537", "modified": "2023-12-13T01:21:35.084822Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2007:0909", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "MDKSA-2007:157", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "24889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24889" }, { "name": "23932", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23932" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "http://www.kde.org/info/security/advisory-20070206-1.txt", "refsource": "CONFIRM", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "32975", "refsource": "OSVDB", "url": "http://osvdb.org/32975" }, { "name": "GLSA-200703-10", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "name": "USN-420-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "27108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27108" }, { "name": "https://issues.rpath.com/browse/RPL-1117", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "24463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24463" }, { "name": "1017591", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017591" }, { "name": "24065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24065" }, { "name": "24013", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24013" }, { "name": "oval:org.mitre.oval:def:10244", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "MDKSA-2007:031", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "ADV-2007-0505", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "22428", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22428" }, { "name": "24442", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24442" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kde:konqueror:3.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0537" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kde.org/info/security/advisory-20070206-1.txt", "refsource": "CONFIRM", "tags": [], "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "name": "https://issues.rpath.com/browse/RPL-1117", "refsource": "CONFIRM", "tags": [], "url": "https://issues.rpath.com/browse/RPL-1117" }, { "name": "GLSA-200703-10", "refsource": "GENTOO", "tags": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "name": "USN-420-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "name": "22428", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/22428" }, { "name": "1017591", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1017591" }, { "name": "23932", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/23932" }, { "name": "24013", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24013" }, { "name": "24065", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24065" }, { "name": "24442", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24442" }, { "name": "24463", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24463" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "24889", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24889" }, { "name": "MDKSA-2007:031", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "name": "MDKSA-2007:157", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "name": "RHSA-2007:0909", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "name": "27108", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27108" }, { "name": "32975", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/32975" }, { "name": "ADV-2007-0505", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "name": "oval:org.mitre.oval:def:10244", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "name": "20070124 Re: Safari Improperly Parses HTML Documents \u0026 BlogSpot XSS vulnerability", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true } }, "lastModifiedDate": "2018-10-16T16:33Z", "publishedDate": "2007-01-29T16:28Z" } } }
var-200701-0295
Vulnerability from variot
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478. As a result, authentication information may be leaked. Konquerer is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied data. Exploiting this issue may help the attacker steal cookie-based authentication credentials and launch other attacks. All versions of KDE up to and including KDE 3.5.6 are vulnerable to this issue. Apple Safari web browser is also vulnerable to this issue. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200703-10
http://security.gentoo.org/
Severity: Low Title: KHTML: Cross-site scripting (XSS) vulnerability Date: March 10, 2007 Bugs: #165606 ID: 200703-10
Synopsis
The KHTML component shipped with the KDE libraries is prone to a cross-site scripting (XSS) vulnerability.
Background
KDE is a feature-rich graphical desktop environment for Linux and Unix-like Operating Systems. KHTML is the HTML interpreter used in Konqueror and other parts of KDE.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 kde-base/kdelibs < 3.5.5-r8 >= 3.5.5-r8
Description
The KHTML code allows for the execution of JavaScript code located inside the "Title" HTML element, a related issue to the Safari error found by Jose Avila.
Impact
When viewing a HTML page that renders unsanitized attacker-supplied input in the page title, Konqueror and other parts of KDE will execute arbitrary JavaScript code contained in the page title, allowing for the theft of browser session data or cookies.
Workaround
There is no known workaround at this time.
Resolution
All KDElibs users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.5-r8"
References
[ 1 ] CVE-2007-0537 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537 [ 2 ] CVE-2007-0478 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200703-10.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . =========================================================== Ubuntu Security Notice USN-420-1 February 06, 2007 kdelibs vulnerability CVE-2007-0537 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.10 Ubuntu 6.06 LTS Ubuntu 6.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 5.10: kdelibs4c2 4:3.4.3-0ubuntu2.2
Ubuntu 6.06 LTS: kdelibs4c2a 4:3.5.2-0ubuntu18.2
Ubuntu 6.10: kdelibs4c2a 4:3.5.5-0ubuntu3.1
After a standard system upgrade you need to restart your session to effect the necessary changes. By tricking a Konqueror user into visiting a malicious website, an attacker could bypass cross-site scripting protections.
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.diff.gz
Size/MD5: 330443 7bf67340aef75bbafe1bf0f517ad0677
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.dsc
Size/MD5: 1523 9a013d5dc8f7953036af99dd264f9811
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz
Size/MD5: 19981388 36e7a8320bd95760b41c4849da170100
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2.2_all.deb
Size/MD5: 6970448 a0a541bd78cb848da8aa97ac4b29d0fe
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2.2_all.deb
Size/MD5: 29298458 f04629ca27bafeaa897a86839fc6e645
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2_all.deb
Size/MD5: 30714 8ec392ba5ba0f78e9b12dd9d025019d6
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_amd64.deb
Size/MD5: 926668 3e7c767a9eeb80d0a85640d7dbfb53d7
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_amd64.deb
Size/MD5: 1309046 e73c5de672193ac0385a28dd3accf646
http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_amd64.deb
Size/MD5: 22552842 287114119aee64a256f8fce295e9d034
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_amd64.deb
Size/MD5: 9109026 aa34fe2f02d9772ad8e25bb36e573505
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_i386.deb
Size/MD5: 814498 1eace86f58caf3f936c77e749a45ffc6
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_i386.deb
Size/MD5: 1305652 0ce209d9c2c5ed846dbb1edc16fe5606
http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_i386.deb
Size/MD5: 19410566 85751508b7f13b790cbda8d795930a72
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_i386.deb
Size/MD5: 8072650 9caf6a826bb790e309036555f40b9b8d
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_powerpc.deb
Size/MD5: 909782 0a1cbec28532ca006c7ddcb6990a6e65
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_powerpc.deb
Size/MD5: 1310430 f31f57e3c37f8c12e586cfa0084dc203
http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_powerpc.deb
Size/MD5: 22763768 b1aba1f6b9ef2c454f2172d442302b49
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_powerpc.deb
Size/MD5: 8433768 18b2c898ed6d40844c19635d8b85e8a2
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_sparc.deb
Size/MD5: 831058 158b90fe780e29e6618cf4b7f9f96bc8
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_sparc.deb
Size/MD5: 1307028 b1c14bf29a7622ac3844c68a652bf21c
http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_sparc.deb
Size/MD5: 20031538 f2778deea8ef14eb9b3e90f5ed97ab50
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_sparc.deb
Size/MD5: 8241130 26c0145f1abb71b0a3ea5a89214df223
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.diff.gz
Size/MD5: 477706 5d236a3b69a4bae7b81d337e58a2c3fe
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.dsc
Size/MD5: 1609 0a27d1f21c1374d8abf8ea0dba0abf79
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2.orig.tar.gz
Size/MD5: 18775353 00c878d449522fb8aa2769a4c5ae1fde
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.2-0ubuntu18.2_all.deb
Size/MD5: 7083858 f74b97726f683b5eca3798bd8f7ae2a1
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.2-0ubuntu18.2_all.deb
Size/MD5: 41496444 87e2fc31c4dd95cd7d87aeee51dec330
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2_all.deb
Size/MD5: 35748 636e14773798c30ddf4c0a87b3d5cd39
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_amd64.deb
Size/MD5: 925624 1ba9b88fc6456c6dac97693532412fde
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_amd64.deb
Size/MD5: 26451886 2eaed22c02f68909ebe219629a774dc6
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_amd64.deb
Size/MD5: 1355626 1458250a60303a07ad551ce343ae23ec
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_amd64.deb
Size/MD5: 9406898 7f952f591c7345216bfc0bb42277875d
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_i386.deb
Size/MD5: 814970 cc6ae65176411013a8dea78a77151e25
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_i386.deb
Size/MD5: 22925204 60d4c71b837e82da16d2b1ad75cbf628
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_i386.deb
Size/MD5: 1352256 1ceee31122ff0fe680fbdbebbd6c8ced
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_i386.deb
Size/MD5: 8334452 427cd25652287fc52ba2bdbd028c2f33
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_powerpc.deb
Size/MD5: 905950 4b29acb4cc1a8fb52ff9bb7b3715b0d3
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_powerpc.deb
Size/MD5: 26718664 f92f6f62ab9b9bbd0da8cb649dbeb132
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_powerpc.deb
Size/MD5: 1356968 a6e62679f09dbafa54137204af905494
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_powerpc.deb
Size/MD5: 8689506 0b3b6f533712eb6a8143827d2b01b015
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_sparc.deb
Size/MD5: 827096 17f46503797d14c6be17c7fd890ac843
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_sparc.deb
Size/MD5: 23623320 36aefb75ec36a60d3308392842556130
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_sparc.deb
Size/MD5: 1353298 9627c92acea5abc671668d0b5ecfd744
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_sparc.deb
Size/MD5: 8491558 dd2fe11d276e78bb16bd42bc34452c20
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.diff.gz
Size/MD5: 734200 8d5db0d6c6070468a32841b75a9e0d83
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.dsc
Size/MD5: 1691 7a23f4f003e66e4a4fb90f620a0de347
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5.orig.tar.gz
Size/MD5: 18926397 65e455d5814142ee992097230ffe7e80
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.5-0ubuntu3.1_all.deb
Size/MD5: 7210528 1e62a8249a44e98da5ba24c1eaa1d4f0
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.5-0ubuntu3.1_all.deb
Size/MD5: 39981890 5469fd4b98d68f0e01ddb4bd5ba7d904
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1_all.deb
Size/MD5: 37742 2b1ebdb5648cbd390ecd1fa8d6b2d7e4
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_amd64.deb
Size/MD5: 27050664 b7884e4a85307416811f755e2ed967aa
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_amd64.deb
Size/MD5: 1345432 c2cd5e2b9433e629ae366965b47c30c6
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_amd64.deb
Size/MD5: 10401586 f02e2f09dfd27d09f2a00daaaa6a7969
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_i386.deb
Size/MD5: 26229446 ae021c2a0a95f237a934962a39e13821
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_i386.deb
Size/MD5: 1343076 5e46eaa9d38a6876671efd18ac052ef5
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_i386.deb
Size/MD5: 9555316 4573d9f461ff2a441a13ac744e8f27e5
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_powerpc.deb
Size/MD5: 28018226 74bc9b1b1e11817b33e3027213462fa0
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_powerpc.deb
Size/MD5: 1347170 df48d8bc10826c2805d607f4d52eb738
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_powerpc.deb
Size/MD5: 9782346 4d5986ecf7ace1bd5bf275d101f98e03
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_sparc.deb
Size/MD5: 25362410 e80c7336df062cac6690d745d91730fc
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_sparc.deb
Size/MD5: 1343134 cc62c0d393cacc36a552c304cee9b2a1
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_sparc.deb
Size/MD5: 9473018 dfff27cb2bcb323d51d4b16e11453d49
. Also affects kdelibs 3.5.6, as per KDE official advisory.
Updated packages have been patched to prevent this.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537
Updated Packages:
Mandriva Linux 2007.1: 290249d063eb99aa0267060e28bd3d63 2007.1/i586/kdelibs-common-3.5.6-11.1mdv2007.1.i586.rpm 0392bf166e2b95b8274f67e24066dc8a 2007.1/i586/kdelibs-devel-doc-3.5.6-11.1mdv2007.1.i586.rpm 06107eb81ff8b184812f7a8ae31b52b9 2007.1/i586/libkdecore4-3.5.6-11.1mdv2007.1.i586.rpm ffb71260989867bcec7d7fae45b86b5a 2007.1/i586/libkdecore4-devel-3.5.6-11.1mdv2007.1.i586.rpm 2f2938b43f88a2a197e6cc90b35c63b8 2007.1/SRPMS/kdelibs-3.5.6-11.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: 258cf38cce814a12a44c79c283de7c3d 2007.1/x86_64/kdelibs-common-3.5.6-11.1mdv2007.1.x86_64.rpm 70b9d63ac375ba65fb6c6b526dfe80f0 2007.1/x86_64/kdelibs-devel-doc-3.5.6-11.1mdv2007.1.x86_64.rpm ee0681c70efd4cebb72a23b773d56f09 2007.1/x86_64/lib64kdecore4-3.5.6-11.1mdv2007.1.x86_64.rpm 664da181e64ab3f343b265cac6de0e87 2007.1/x86_64/lib64kdecore4-devel-3.5.6-11.1mdv2007.1.x86_64.rpm 2f2938b43f88a2a197e6cc90b35c63b8 2007.1/SRPMS/kdelibs-3.5.6-11.1mdv2007.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFGvN99mqjQ0CJFipgRAkoiAJ9cYCEKSJXMFS0+C1kOsR82hamhUQCdHdlA 0d14cDmgZcJ1DxJi7dCNr3E= =ix0J -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200701-0295", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "konqueror", "scope": "eq", "trust": 2.4, "vendor": "kde", "version": "3.5.5" }, { "model": "kde", "scope": "lte", "trust": 0.8, "vendor": "kde", "version": "3.5.6" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "turbolinux", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10_f" }, { "model": "turbolinux desktop", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux fuji", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux multimedia", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux personal", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10 (x64)" }, { "model": "home", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "5.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0.0x64" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "fuji", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "f...", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10" }, { "model": "home", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "fuji", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "0" }, { "model": "linux enterprise server sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise sdk", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux professional x86 64", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.2" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10.2" }, { "model": "unitedlinux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "suse linux standard server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "suse linux school server for i386", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "suse linux retail solution", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.0" }, { "model": "suse linux openexchange server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.0" }, { "model": "suse linux open-xchange", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "4.1" }, { "model": "suse core for", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9x86" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "office server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "linux professional oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "linux professional", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "linux personal oss", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "linux openexchange server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "linux office server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "linux enterprise server for s/390", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux enterprise server for s/390", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "1.0" }, { "model": "linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10" }, { "model": "linux database server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1x86-64" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1x86" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0x86-64" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0x86" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "2007.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "libkhtml", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "4.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.3" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.2-6" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.5" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.4" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.3" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1" }, { "model": "konqueror b", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.5" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.5" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.3" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.2.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.2.1" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.2" }, { "model": "konqueror", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.4" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4.3" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.5" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.4" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.3" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.2" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.0.1" }, { "model": "kdelibs", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.0" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.6" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.5" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.4" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.5" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.4" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.5" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.4" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.2" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.1" }, { "model": "b", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.5" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.5" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.5" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.4" }, { "model": "a", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.3" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.0" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.2.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.2.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.0.1" }, { "model": "beta", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.0" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "2.0" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "1.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "1.1.2" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "1.1.1" }, { "model": "kde", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "1.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "safari rss pre-release", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "1.0" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2" }, { "model": "mobile safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage job workload server", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.1" }, { "model": "interstage business application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.0" }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage apworks modelers-j edition 6.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server web-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "interstage application server web-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "4.0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "interstage application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "4.0" }, { "model": "interstage application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "3.0" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "4.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "3.0" } ], "sources": [ { "db": "BID", "id": "22428" }, { "db": "BID", "id": "23020" }, { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "CNNVD", "id": "CNNVD-200701-477" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:kde:kde", "vulnerable": true }, { "cpe22Uri": "cpe:/a:kde:konqueror", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_fuji", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_multimedia", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_personal", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_home", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000221" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "CNNVD", "id": "CNNVD-200701-477" } ], "trust": 0.6 }, "cve": "CVE-2007-0537", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "CVE-2007-0537", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.0, "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2007-0537", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-0537", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2007-0537", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200701-477", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "CNNVD", "id": "CNNVD-200701-477" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478. As a result, authentication information may be leaked. Konquerer is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied data. \nExploiting this issue may help the attacker steal cookie-based authentication credentials and launch other attacks. \nAll versions of KDE up to and including KDE 3.5.6 are vulnerable to this issue. Apple Safari web browser is also vulnerable to this issue. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200703-10\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Low\n Title: KHTML: Cross-site scripting (XSS) vulnerability\n Date: March 10, 2007\n Bugs: #165606\n ID: 200703-10\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nThe KHTML component shipped with the KDE libraries is prone to a\ncross-site scripting (XSS) vulnerability. \n\nBackground\n==========\n\nKDE is a feature-rich graphical desktop environment for Linux and\nUnix-like Operating Systems. KHTML is the HTML interpreter used in\nKonqueror and other parts of KDE. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 kde-base/kdelibs \u003c 3.5.5-r8 \u003e= 3.5.5-r8\n\nDescription\n===========\n\nThe KHTML code allows for the execution of JavaScript code located\ninside the \"Title\" HTML element, a related issue to the Safari error\nfound by Jose Avila. \n\nImpact\n======\n\nWhen viewing a HTML page that renders unsanitized attacker-supplied\ninput in the page title, Konqueror and other parts of KDE will execute\narbitrary JavaScript code contained in the page title, allowing for the\ntheft of browser session data or cookies. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll KDElibs users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=kde-base/kdelibs-3.5.5-r8\"\n\nReferences\n==========\n\n [ 1 ] CVE-2007-0537\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537\n [ 2 ] CVE-2007-0478\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0478\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200703-10.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2007 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. =========================================================== \nUbuntu Security Notice USN-420-1 February 06, 2007\nkdelibs vulnerability\nCVE-2007-0537\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 5.10\nUbuntu 6.06 LTS\nUbuntu 6.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 5.10:\n kdelibs4c2 4:3.4.3-0ubuntu2.2\n\nUbuntu 6.06 LTS:\n kdelibs4c2a 4:3.5.2-0ubuntu18.2\n\nUbuntu 6.10:\n kdelibs4c2a 4:3.5.5-0ubuntu3.1\n\nAfter a standard system upgrade you need to restart your session to\neffect the necessary changes. By \ntricking a Konqueror user into visiting a malicious website, an attacker \ncould bypass cross-site scripting protections. \n\n\nUpdated packages for Ubuntu 5.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.diff.gz\n Size/MD5: 330443 7bf67340aef75bbafe1bf0f517ad0677\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.dsc\n Size/MD5: 1523 9a013d5dc8f7953036af99dd264f9811\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz\n Size/MD5: 19981388 36e7a8320bd95760b41c4849da170100\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2.2_all.deb\n Size/MD5: 6970448 a0a541bd78cb848da8aa97ac4b29d0fe\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2.2_all.deb\n Size/MD5: 29298458 f04629ca27bafeaa897a86839fc6e645\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2_all.deb\n Size/MD5: 30714 8ec392ba5ba0f78e9b12dd9d025019d6\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_amd64.deb\n Size/MD5: 926668 3e7c767a9eeb80d0a85640d7dbfb53d7\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_amd64.deb\n Size/MD5: 1309046 e73c5de672193ac0385a28dd3accf646\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_amd64.deb\n Size/MD5: 22552842 287114119aee64a256f8fce295e9d034\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_amd64.deb\n Size/MD5: 9109026 aa34fe2f02d9772ad8e25bb36e573505\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_i386.deb\n Size/MD5: 814498 1eace86f58caf3f936c77e749a45ffc6\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_i386.deb\n Size/MD5: 1305652 0ce209d9c2c5ed846dbb1edc16fe5606\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_i386.deb\n Size/MD5: 19410566 85751508b7f13b790cbda8d795930a72\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_i386.deb\n Size/MD5: 8072650 9caf6a826bb790e309036555f40b9b8d\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_powerpc.deb\n Size/MD5: 909782 0a1cbec28532ca006c7ddcb6990a6e65\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_powerpc.deb\n Size/MD5: 1310430 f31f57e3c37f8c12e586cfa0084dc203\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_powerpc.deb\n Size/MD5: 22763768 b1aba1f6b9ef2c454f2172d442302b49\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_powerpc.deb\n Size/MD5: 8433768 18b2c898ed6d40844c19635d8b85e8a2\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_sparc.deb\n Size/MD5: 831058 158b90fe780e29e6618cf4b7f9f96bc8\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_sparc.deb\n Size/MD5: 1307028 b1c14bf29a7622ac3844c68a652bf21c\n http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_sparc.deb\n Size/MD5: 20031538 f2778deea8ef14eb9b3e90f5ed97ab50\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_sparc.deb\n Size/MD5: 8241130 26c0145f1abb71b0a3ea5a89214df223\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.diff.gz\n Size/MD5: 477706 5d236a3b69a4bae7b81d337e58a2c3fe\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.dsc\n Size/MD5: 1609 0a27d1f21c1374d8abf8ea0dba0abf79\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2.orig.tar.gz\n Size/MD5: 18775353 00c878d449522fb8aa2769a4c5ae1fde\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.2-0ubuntu18.2_all.deb\n Size/MD5: 7083858 f74b97726f683b5eca3798bd8f7ae2a1\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.2-0ubuntu18.2_all.deb\n Size/MD5: 41496444 87e2fc31c4dd95cd7d87aeee51dec330\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2_all.deb\n Size/MD5: 35748 636e14773798c30ddf4c0a87b3d5cd39\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_amd64.deb\n Size/MD5: 925624 1ba9b88fc6456c6dac97693532412fde\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_amd64.deb\n Size/MD5: 26451886 2eaed22c02f68909ebe219629a774dc6\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_amd64.deb\n Size/MD5: 1355626 1458250a60303a07ad551ce343ae23ec\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_amd64.deb\n Size/MD5: 9406898 7f952f591c7345216bfc0bb42277875d\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_i386.deb\n Size/MD5: 814970 cc6ae65176411013a8dea78a77151e25\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_i386.deb\n Size/MD5: 22925204 60d4c71b837e82da16d2b1ad75cbf628\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_i386.deb\n Size/MD5: 1352256 1ceee31122ff0fe680fbdbebbd6c8ced\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_i386.deb\n Size/MD5: 8334452 427cd25652287fc52ba2bdbd028c2f33\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_powerpc.deb\n Size/MD5: 905950 4b29acb4cc1a8fb52ff9bb7b3715b0d3\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_powerpc.deb\n Size/MD5: 26718664 f92f6f62ab9b9bbd0da8cb649dbeb132\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_powerpc.deb\n Size/MD5: 1356968 a6e62679f09dbafa54137204af905494\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_powerpc.deb\n Size/MD5: 8689506 0b3b6f533712eb6a8143827d2b01b015\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_sparc.deb\n Size/MD5: 827096 17f46503797d14c6be17c7fd890ac843\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_sparc.deb\n Size/MD5: 23623320 36aefb75ec36a60d3308392842556130\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_sparc.deb\n Size/MD5: 1353298 9627c92acea5abc671668d0b5ecfd744\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_sparc.deb\n Size/MD5: 8491558 dd2fe11d276e78bb16bd42bc34452c20\n\nUpdated packages for Ubuntu 6.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.diff.gz\n Size/MD5: 734200 8d5db0d6c6070468a32841b75a9e0d83\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.dsc\n Size/MD5: 1691 7a23f4f003e66e4a4fb90f620a0de347\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5.orig.tar.gz\n Size/MD5: 18926397 65e455d5814142ee992097230ffe7e80\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.5-0ubuntu3.1_all.deb\n Size/MD5: 7210528 1e62a8249a44e98da5ba24c1eaa1d4f0\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.5-0ubuntu3.1_all.deb\n Size/MD5: 39981890 5469fd4b98d68f0e01ddb4bd5ba7d904\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1_all.deb\n Size/MD5: 37742 2b1ebdb5648cbd390ecd1fa8d6b2d7e4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_amd64.deb\n Size/MD5: 27050664 b7884e4a85307416811f755e2ed967aa\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_amd64.deb\n Size/MD5: 1345432 c2cd5e2b9433e629ae366965b47c30c6\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_amd64.deb\n Size/MD5: 10401586 f02e2f09dfd27d09f2a00daaaa6a7969\n\n i386 architecture (x86 compatible Intel/AMD)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_i386.deb\n Size/MD5: 26229446 ae021c2a0a95f237a934962a39e13821\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_i386.deb\n Size/MD5: 1343076 5e46eaa9d38a6876671efd18ac052ef5\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_i386.deb\n Size/MD5: 9555316 4573d9f461ff2a441a13ac744e8f27e5\n\n powerpc architecture (Apple Macintosh G3/G4/G5)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_powerpc.deb\n Size/MD5: 28018226 74bc9b1b1e11817b33e3027213462fa0\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_powerpc.deb\n Size/MD5: 1347170 df48d8bc10826c2805d607f4d52eb738\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_powerpc.deb\n Size/MD5: 9782346 4d5986ecf7ace1bd5bf275d101f98e03\n\n sparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_sparc.deb\n Size/MD5: 25362410 e80c7336df062cac6690d745d91730fc\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_sparc.deb\n Size/MD5: 1343134 cc62c0d393cacc36a552c304cee9b2a1\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_sparc.deb\n Size/MD5: 9473018 dfff27cb2bcb323d51d4b16e11453d49\n\n. Also affects kdelibs 3.5.6,\n as per KDE official advisory. \n \n Updated packages have been patched to prevent this. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 290249d063eb99aa0267060e28bd3d63 2007.1/i586/kdelibs-common-3.5.6-11.1mdv2007.1.i586.rpm\n 0392bf166e2b95b8274f67e24066dc8a 2007.1/i586/kdelibs-devel-doc-3.5.6-11.1mdv2007.1.i586.rpm\n 06107eb81ff8b184812f7a8ae31b52b9 2007.1/i586/libkdecore4-3.5.6-11.1mdv2007.1.i586.rpm\n ffb71260989867bcec7d7fae45b86b5a 2007.1/i586/libkdecore4-devel-3.5.6-11.1mdv2007.1.i586.rpm \n 2f2938b43f88a2a197e6cc90b35c63b8 2007.1/SRPMS/kdelibs-3.5.6-11.1mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n 258cf38cce814a12a44c79c283de7c3d 2007.1/x86_64/kdelibs-common-3.5.6-11.1mdv2007.1.x86_64.rpm\n 70b9d63ac375ba65fb6c6b526dfe80f0 2007.1/x86_64/kdelibs-devel-doc-3.5.6-11.1mdv2007.1.x86_64.rpm\n ee0681c70efd4cebb72a23b773d56f09 2007.1/x86_64/lib64kdecore4-3.5.6-11.1mdv2007.1.x86_64.rpm\n 664da181e64ab3f343b265cac6de0e87 2007.1/x86_64/lib64kdecore4-devel-3.5.6-11.1mdv2007.1.x86_64.rpm \n 2f2938b43f88a2a197e6cc90b35c63b8 2007.1/SRPMS/kdelibs-3.5.6-11.1mdv2007.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFGvN99mqjQ0CJFipgRAkoiAJ9cYCEKSJXMFS0+C1kOsR82hamhUQCdHdlA\n0d14cDmgZcJ1DxJi7dCNr3E=\n=ix0J\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-0537" }, { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "BID", "id": "22428" }, { "db": "BID", "id": "23020" }, { "db": "PACKETSTORM", "id": "55049" }, { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "54252" }, { "db": "PACKETSTORM", "id": "58491" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-0537", "trust": 3.4 }, { "db": "BID", "id": "22428", "trust": 2.7 }, { "db": "SECUNIA", "id": "23932", "trust": 2.4 }, { "db": "SECTRACK", "id": "1017591", "trust": 2.4 }, { "db": "SECUNIA", "id": "24442", "trust": 1.6 }, { "db": "SECUNIA", "id": "24013", "trust": 1.6 }, { "db": "SECUNIA", "id": "24889", "trust": 1.6 }, { "db": "SECUNIA", "id": "24463", "trust": 1.6 }, { "db": "SECUNIA", "id": "27108", "trust": 1.6 }, { "db": "SECUNIA", "id": "24065", "trust": 1.6 }, { "db": "OSVDB", "id": "32975", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2007-0505", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2007-000221", "trust": 0.8 }, { "db": "SUSE", "id": "SUSE-SR:2007:006", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2007:0909", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2007:031", "trust": 0.6 }, { "db": "MANDRIVA", "id": "MDKSA-2007:157", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070124 RE: SAFARI IMPROPERLY PARSES HTML DOCUMENTS \u0026 BLOGSPOT XSS VULNERABILITY", "trust": 0.6 }, { "db": "UBUNTU", "id": "USN-420-1", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200703-10", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200701-477", "trust": 0.6 }, { "db": "BID", "id": "23020", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "55049", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "54183", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "54252", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58491", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "22428" }, { "db": "BID", "id": "23020" }, { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "PACKETSTORM", "id": "55049" }, { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "54252" }, { "db": "PACKETSTORM", "id": "58491" }, { "db": "CNNVD", "id": "CNNVD-200701-477" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "id": "VAR-200701-0295", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.16519225 }, "last_update_date": "2024-11-29T22:06:16.985000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kdelibs-3.5.5-11.15AX", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=48" }, { "title": "khtml/konqueror title XSS vulnerability", "trust": 0.8, "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "title": "kdelibs (V4.0)", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=1153" }, { "title": "RHSA-2007:0909", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2007-0909.html" }, { "title": "TLSA-2007-19", "trust": 0.8, "url": "http://www.turbolinux.com/security/2007/TLSA-2007-19.txt" }, { "title": "RHSA-2007:0909", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2007-0909J.html" }, { "title": "TLSA-2007-19", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2007/TLSA-2007-19j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000221" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://secunia.com/advisories/23932" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/22428" }, { "trust": 2.4, "url": "http://securitytracker.com/id?1017591" }, { "trust": 1.9, "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "trust": 1.6, "url": "https://issues.rpath.com/browse/rpl-1117" }, { "trust": 1.6, "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2007-0909.html" }, { "trust": 1.6, "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:157" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2007:031" }, { "trust": 1.6, "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "trust": 1.6, "url": "http://secunia.com/advisories/27108" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24889" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24463" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24442" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24065" }, { "trust": 1.6, "url": "http://secunia.com/advisories/24013" }, { "trust": 1.6, "url": "http://osvdb.org/32975" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/0505" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0537" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10244" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2007/0505" }, { "trust": 0.9, "url": "http://www.securityfocus.com/archive/1/archive/1/457924/100/0/threaded" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0537" }, { "trust": 0.6, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2007:031" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0537" }, { "trust": 0.3, "url": "http://www.kde.org/" }, { "trust": 0.3, "url": "http://www.konqueror.org/" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.3, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200701e.html" }, { "trust": 0.3, "url": "http://jvn.jp/jp/jvn%2383832818/index.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0478" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-200703-10.xml" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0478" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.3-0ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3-0ubuntu2.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.2-0ubuntu18.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.5.2-0ubuntu18.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2_3.4.3-0ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.2-0ubuntu18.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.5-0ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.2-0ubuntu18.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.3-0ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdelibs/kdelibs4c2-dbg_3.4.3-0ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.2-0ubuntu18.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.3-0ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.5-0ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.5-0ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.2-0ubuntu18.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.5-0ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.5-0ubuntu3.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.2-0ubuntu18.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.5-0ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.3-0ubuntu2.2_amd64.deb" } ], "sources": [ { "db": "BID", "id": "22428" }, { "db": "BID", "id": "23020" }, { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "PACKETSTORM", "id": "55049" }, { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "54252" }, { "db": "PACKETSTORM", "id": "58491" }, { "db": "CNNVD", "id": "CNNVD-200701-477" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "22428" }, { "db": "BID", "id": "23020" }, { "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "db": "PACKETSTORM", "id": "55049" }, { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "54252" }, { "db": "PACKETSTORM", "id": "58491" }, { "db": "CNNVD", "id": "CNNVD-200701-477" }, { "db": "NVD", "id": "CVE-2007-0537" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-02-06T00:00:00", "db": "BID", "id": "22428" }, { "date": "2007-03-19T00:00:00", "db": "BID", "id": "23020" }, { "date": "2007-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "date": "2007-03-14T00:54:51", "db": "PACKETSTORM", "id": "55049" }, { "date": "2007-02-06T04:21:11", "db": "PACKETSTORM", "id": "54183" }, { "date": "2007-02-08T04:48:24", "db": "PACKETSTORM", "id": "54252" }, { "date": "2007-08-14T00:24:12", "db": "PACKETSTORM", "id": "58491" }, { "date": "2006-06-01T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-477" }, { "date": "2007-01-29T16:28:00", "db": "NVD", "id": "CVE-2007-0537" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-19T09:23:00", "db": "BID", "id": "22428" }, { "date": "2007-03-19T20:14:00", "db": "BID", "id": "23020" }, { "date": "2007-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000221" }, { "date": "2007-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200701-477" }, { "date": "2024-11-21T00:26:07.630000", "db": "NVD", "id": "CVE-2007-0537" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "58491" }, { "db": "CNNVD", "id": "CNNVD-200701-477" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "KDE kdelibs Cross-site scripting vulnerability due to title tag", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000221" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "54183" }, { "db": "PACKETSTORM", "id": "54252" }, { "db": "PACKETSTORM", "id": "58491" }, { "db": "CNNVD", "id": "CNNVD-200701-477" } ], "trust": 0.9 } }
ghsa-qpw4-qr5r-cjxc
Vulnerability from github
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
{ "affected": [], "aliases": [ "CVE-2007-0537" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-01-29T16:28:00Z", "severity": "LOW" }, "details": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.", "id": "GHSA-qpw4-qr5r-cjxc", "modified": "2022-05-01T17:45:06Z", "published": "2022-05-01T17:45:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0537" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1117" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10244" }, { "type": "WEB", "url": "http://osvdb.org/32975" }, { "type": "WEB", "url": "http://secunia.com/advisories/23932" }, { "type": "WEB", "url": "http://secunia.com/advisories/24013" }, { "type": "WEB", "url": "http://secunia.com/advisories/24065" }, { "type": "WEB", "url": "http://secunia.com/advisories/24442" }, { "type": "WEB", "url": "http://secunia.com/advisories/24463" }, { "type": "WEB", "url": "http://secunia.com/advisories/24889" }, { "type": "WEB", "url": "http://secunia.com/advisories/27108" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017591" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200703-10.xml" }, { "type": "WEB", "url": "http://www.kde.org/info/security/advisory-20070206-1.txt" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:031" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:157" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-0909.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/457924/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/22428" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-420-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/0505" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2007_0909
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kdelibs packages that resolve several security flaws are\nnow available for Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kdelibs package provides libraries for the K Desktop Environment (KDE).\n\nTwo cross-site-scripting flaws were found in the way Konqueror processes\ncertain HTML content. This could result in a malicious attacker presenting\nmisleading content to an unsuspecting user. (CVE-2007-0242, CVE-2007-0537)\n\nA flaw was found in KDE JavaScript implementation. A web page containing\nmalicious JavaScript code could cause Konqueror to crash. (CVE-2007-1308)\n\nA flaw was found in the way Konqueror handled certain FTP PASV commands.\nA malicious FTP server could use this flaw to perform a rudimentary\nport-scan of machines behind a user\u0027s firewall. (CVE-2007-1564)\n\nTwo Konqueror address spoofing flaws have been discovered. It was\npossible for a malicious website to cause the Konqueror address bar to\ndisplay information which could trick a user into believing they are at a \ndifferent website than they actually are. (CVE-2007-3820, CVE-2007-4224)\n\nUsers of KDE should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:0909", "url": "https://access.redhat.com/errata/RHSA-2007:0909" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "229606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229606" }, { "category": "external", "summary": "233592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=233592" }, { "category": "external", "summary": "234633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=234633" }, { "category": "external", "summary": "248537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248537" }, { "category": "external", "summary": "251708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251708" }, { "category": "external", "summary": "299891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=299891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0909.json" } ], "title": "Red Hat Security Advisory: kdelibs security update", "tracking": { "current_release_date": "2024-11-22T01:29:08+00:00", "generator": { "date": "2024-11-22T01:29:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:0909", "initial_release_date": "2007-10-08T08:11:00+00:00", "revision_history": [ { "date": "2007-10-08T08:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-01-08T20:17:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:29:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.ia64", "product": { "name": "kdelibs-6:3.3.1-9.el4.ia64", "product_id": "kdelibs-6:3.3.1-9.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.ia64", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.ia64", "product_id": "kdelibs-devel-6:3.3.1-9.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.ia64", "product": { "name": "kdelibs-6:3.5.4-13.el5.ia64", "product_id": "kdelibs-6:3.5.4-13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.ia64", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.ia64", "product_id": "kdelibs-devel-6:3.5.4-13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=ia64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "product": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "product_id": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-apidocs@3.5.4-13.el5?arch=ia64\u0026epoch=6" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.i386", "product": { "name": "kdelibs-6:3.3.1-9.el4.i386", "product_id": "kdelibs-6:3.3.1-9.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.i386", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.i386", "product_id": "kdelibs-devel-6:3.3.1-9.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.i386", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.i386", "product_id": "kdelibs-devel-6:3.5.4-13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.i386", "product": { "name": "kdelibs-6:3.5.4-13.el5.i386", "product_id": "kdelibs-6:3.5.4-13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=i386\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "product": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "product_id": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-apidocs@3.5.4-13.el5?arch=i386\u0026epoch=6" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.src", "product": { "name": "kdelibs-6:3.3.1-9.el4.src", "product_id": "kdelibs-6:3.3.1-9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=src\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.src", "product": { "name": "kdelibs-6:3.5.4-13.el5.src", "product_id": "kdelibs-6:3.5.4-13.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=src\u0026epoch=6" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.x86_64", "product": { "name": "kdelibs-6:3.3.1-9.el4.x86_64", "product_id": "kdelibs-6:3.3.1-9.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "product_id": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "product_id": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.x86_64", "product": { "name": "kdelibs-6:3.5.4-13.el5.x86_64", "product_id": "kdelibs-6:3.5.4-13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=x86_64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "product": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "product_id": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-apidocs@3.5.4-13.el5?arch=x86_64\u0026epoch=6" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.ppc64", "product": { "name": "kdelibs-6:3.3.1-9.el4.ppc64", "product_id": "kdelibs-6:3.3.1-9.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=ppc64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=ppc64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.ppc64", "product": { "name": "kdelibs-6:3.5.4-13.el5.ppc64", "product_id": "kdelibs-6:3.5.4-13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=ppc64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=ppc64\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "product_id": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=ppc64\u0026epoch=6" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.ppc", "product": { "name": "kdelibs-6:3.3.1-9.el4.ppc", "product_id": "kdelibs-6:3.3.1-9.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.ppc", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.ppc", "product_id": "kdelibs-devel-6:3.3.1-9.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.ppc", "product": { "name": "kdelibs-6:3.5.4-13.el5.ppc", "product_id": "kdelibs-6:3.5.4-13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.ppc", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc", "product_id": "kdelibs-devel-6:3.5.4-13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=ppc\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "product": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "product_id": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-apidocs@3.5.4-13.el5?arch=ppc\u0026epoch=6" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.s390", "product": { "name": "kdelibs-6:3.3.1-9.el4.s390", "product_id": "kdelibs-6:3.3.1-9.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=s390\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.s390", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390", "product_id": "kdelibs-devel-6:3.3.1-9.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=s390\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=s390\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.s390", "product": { "name": "kdelibs-6:3.5.4-13.el5.s390", "product_id": "kdelibs-6:3.5.4-13.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=s390\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=s390\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.s390", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390", "product_id": "kdelibs-devel-6:3.5.4-13.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=s390\u0026epoch=6" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kdelibs-6:3.3.1-9.el4.s390x", "product": { "name": "kdelibs-6:3.3.1-9.el4.s390x", "product_id": "kdelibs-6:3.3.1-9.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.3.1-9.el4?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.3.1-9.el4.s390x", "product": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390x", "product_id": "kdelibs-devel-6:3.3.1-9.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.3.1-9.el4?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "product": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "product_id": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.3.1-9.el4?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-6:3.5.4-13.el5.s390x", "product": { "name": "kdelibs-6:3.5.4-13.el5.s390x", "product_id": "kdelibs-6:3.5.4-13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs@3.5.4-13.el5?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "product": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "product_id": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-debuginfo@3.5.4-13.el5?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-devel-6:3.5.4-13.el5.s390x", "product": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390x", "product_id": "kdelibs-devel-6:3.5.4-13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-devel@3.5.4-13.el5?arch=s390x\u0026epoch=6" } } }, { "category": "product_version", "name": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "product": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "product_id": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdelibs-apidocs@3.5.4-13.el5?arch=s390x\u0026epoch=6" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.src" }, "product_reference": "kdelibs-6:3.3.1-9.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.src" }, "product_reference": "kdelibs-6:3.3.1-9.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.src" }, "product_reference": "kdelibs-6:3.3.1-9.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.src" }, "product_reference": "kdelibs-6:3.3.1-9.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.i386" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.s390" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.3.1-9.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64" }, "product_reference": "kdelibs-devel-6:3.3.1-9.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src" }, "product_reference": "kdelibs-6:3.5.4-13.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.src" }, "product_reference": "kdelibs-6:3.5.4-13.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.src" }, "product_reference": "kdelibs-6:3.5.4-13.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.i386" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.s390" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kdelibs-devel-6:3.5.4-13.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" }, "product_reference": "kdelibs-devel-6:3.5.4-13.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-0242", "discovery_date": "2007-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "234633" } ], "notes": [ { "category": "description", "text": "The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.", "title": "Vulnerability description" }, { "category": "summary", "text": "QT UTF8 improper character expansion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0242" }, { "category": "external", "summary": "RHBZ#234633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=234633" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0242", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0242" } ], "release_date": "2007-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "QT UTF8 improper character expansion" }, { "cve": "CVE-2007-0537", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2007-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "229606" } ], "notes": [ { "category": "description", "text": "The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.", "title": "Vulnerability description" }, { "category": "summary", "text": "konqueror XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0537" }, { "category": "external", "summary": "RHBZ#229606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0537", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0537" } ], "release_date": "2007-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "konqueror XSS" }, { "cve": "CVE-2007-1308", "discovery_date": "2007-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "299891" } ], "notes": [ { "category": "description", "text": "ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "kdelibs KDE JavaScript denial of service (crash)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1308" }, { "category": "external", "summary": "RHBZ#299891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=299891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1308", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1308" } ], "release_date": "2007-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kdelibs KDE JavaScript denial of service (crash)" }, { "cve": "CVE-2007-1564", "discovery_date": "2007-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "233592" } ], "notes": [ { "category": "description", "text": "The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.", "title": "Vulnerability description" }, { "category": "summary", "text": "FTP protocol PASV design flaw affects konqueror", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.\n\nMore information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-1564" }, { "category": "external", "summary": "RHBZ#233592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=233592" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-1564", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1564" } ], "release_date": "2007-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "FTP protocol PASV design flaw affects konqueror" }, { "cve": "CVE-2007-3820", "discovery_date": "2007-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "248537" } ], "notes": [ { "category": "description", "text": "konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.", "title": "Vulnerability description" }, { "category": "summary", "text": "Spoofing of URI possible in Konqueror\u0027s address bar", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect Red Hat Enterprise Linux 2.1 or 3. For Red Hat Enterprise Linux 4 and 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248537\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3820" }, { "category": "external", "summary": "RHBZ#248537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=248537" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3820", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3820" } ], "release_date": "2007-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Spoofing of URI possible in Konqueror\u0027s address bar" }, { "cve": "CVE-2007-4224", "discovery_date": "2007-08-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "251708" } ], "notes": [ { "category": "description", "text": "KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.", "title": "Vulnerability description" }, { "category": "summary", "text": "URL spoof in address bar", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4224" }, { "category": "external", "summary": "RHBZ#251708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=251708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4224", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4224" } ], "release_date": "2007-08-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-10-08T08:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS:kdelibs-6:3.3.1-9.el4.i386", "4AS:kdelibs-6:3.3.1-9.el4.ia64", "4AS:kdelibs-6:3.3.1-9.el4.ppc", "4AS:kdelibs-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-6:3.3.1-9.el4.s390", "4AS:kdelibs-6:3.3.1-9.el4.s390x", "4AS:kdelibs-6:3.3.1-9.el4.src", "4AS:kdelibs-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4AS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4AS:kdelibs-devel-6:3.3.1-9.el4.i386", "4AS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4AS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390", "4AS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4AS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-6:3.3.1-9.el4.src", "4Desktop:kdelibs-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.i386", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ia64", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.ppc", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.s390x", "4Desktop:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-6:3.3.1-9.el4.i386", "4ES:kdelibs-6:3.3.1-9.el4.ia64", "4ES:kdelibs-6:3.3.1-9.el4.ppc", "4ES:kdelibs-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-6:3.3.1-9.el4.s390", "4ES:kdelibs-6:3.3.1-9.el4.s390x", "4ES:kdelibs-6:3.3.1-9.el4.src", "4ES:kdelibs-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4ES:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4ES:kdelibs-devel-6:3.3.1-9.el4.i386", "4ES:kdelibs-devel-6:3.3.1-9.el4.ia64", "4ES:kdelibs-devel-6:3.3.1-9.el4.ppc", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390", "4ES:kdelibs-devel-6:3.3.1-9.el4.s390x", "4ES:kdelibs-devel-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-6:3.3.1-9.el4.i386", "4WS:kdelibs-6:3.3.1-9.el4.ia64", "4WS:kdelibs-6:3.3.1-9.el4.ppc", "4WS:kdelibs-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-6:3.3.1-9.el4.s390", "4WS:kdelibs-6:3.3.1-9.el4.s390x", "4WS:kdelibs-6:3.3.1-9.el4.src", "4WS:kdelibs-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.i386", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ia64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.ppc64", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.s390x", "4WS:kdelibs-debuginfo-6:3.3.1-9.el4.x86_64", "4WS:kdelibs-devel-6:3.3.1-9.el4.i386", "4WS:kdelibs-devel-6:3.3.1-9.el4.ia64", "4WS:kdelibs-devel-6:3.3.1-9.el4.ppc", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390", "4WS:kdelibs-devel-6:3.3.1-9.el4.s390x", "4WS:kdelibs-devel-6:3.3.1-9.el4.x86_64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.src", "5Client-Workstation:kdelibs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client-Workstation:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-6:3.5.4-13.el5.i386", "5Client:kdelibs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-6:3.5.4-13.el5.s390", "5Client:kdelibs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-6:3.5.4-13.el5.src", "5Client:kdelibs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Client:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Client:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Client:kdelibs-devel-6:3.5.4-13.el5.i386", "5Client:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Client:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390", "5Client:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Client:kdelibs-devel-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-6:3.5.4-13.el5.i386", "5Server:kdelibs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-6:3.5.4-13.el5.s390", "5Server:kdelibs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-6:3.5.4-13.el5.src", "5Server:kdelibs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.i386", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ia64", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.ppc", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.s390x", "5Server:kdelibs-apidocs-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.i386", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ia64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.s390x", "5Server:kdelibs-debuginfo-6:3.5.4-13.el5.x86_64", "5Server:kdelibs-devel-6:3.5.4-13.el5.i386", "5Server:kdelibs-devel-6:3.5.4-13.el5.ia64", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc", "5Server:kdelibs-devel-6:3.5.4-13.el5.ppc64", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390", "5Server:kdelibs-devel-6:3.5.4-13.el5.s390x", "5Server:kdelibs-devel-6:3.5.4-13.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:0909" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "URL spoof in address bar" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.