Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-4965 (GCVE-0-2007-4965)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:17:27.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "25696", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25696" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "38675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38675" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "oval:org.mitre.oval:def:8496", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33937" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28136" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37471" }, { "name": "27460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27460" }, { "name": "28480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28480" }, { "name": "26837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26837" }, { "name": "ADV-2007-3201", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "name": "DSA-1551", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1551" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "29303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29303" }, { "name": "oval:org.mitre.oval:def:8486", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "27872", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27872" }, { "name": "29032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29032" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31492" }, { "name": "FEDORA-2007-2663", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "name": "oval:org.mitre.oval:def:10804", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "20070916 python \u003c= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "RHSA-2007:1076", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "ADV-2008-0637", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "python-imageop-bo(36653)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "27562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27562" }, { "name": "USN-585-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "name": "GLSA-200711-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "name": "MDVSA-2008:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "name": "31255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31255" }, { "name": "20080212 FLEA-2008-0002-1 python", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "name": "MDVSA-2008:013", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "name": "DSA-1620", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1620" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1885" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "29889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29889" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "25696", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25696" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "name": "ADV-2007-4238", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "38675", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38675" }, { "name": "TA07-352A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "oval:org.mitre.oval:def:8496", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "name": "33937", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33937" }, { "name": "28136", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28136" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37471" }, { "name": "27460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27460" }, { "name": "28480", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28480" }, { "name": "26837", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26837" }, { "name": "ADV-2007-3201", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "name": "DSA-1551", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1551" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "29303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29303" }, { "name": "oval:org.mitre.oval:def:8486", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "27872", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27872" }, { "name": "29032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29032" }, { "name": "31492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31492" }, { "name": "FEDORA-2007-2663", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "name": "oval:org.mitre.oval:def:10804", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "name": "RHSA-2008:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "20070916 python \u003c= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "APPLE-SA-2007-12-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "RHSA-2007:1076", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "ADV-2008-0637", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "python-imageop-bo(36653)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "27562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27562" }, { "name": "USN-585-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "name": "GLSA-200711-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "name": "MDVSA-2008:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "name": "31255", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31255" }, { "name": "20080212 FLEA-2008-0002-1 python", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "name": "MDVSA-2008:013", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "name": "DSA-1620", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1620" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1885" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "29889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29889" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "25696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25696" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "name": "ADV-2007-4238", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "38675", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38675" }, { "name": "TA07-352A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "oval:org.mitre.oval:def:8496", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "name": "33937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33937" }, { "name": "28136", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28136" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "27460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27460" }, { "name": "28480", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28480" }, { "name": "26837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26837" }, { "name": "ADV-2007-3201", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "name": "DSA-1551", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1551" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "29303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29303" }, { "name": "oval:org.mitre.oval:def:8486", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "name": "http://support.apple.com/kb/HT3438", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "27872", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27872" }, { "name": "29032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29032" }, { "name": "31492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31492" }, { "name": "FEDORA-2007-2663", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "name": "oval:org.mitre.oval:def:10804", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "name": "RHSA-2008:0629", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "20070916 python \u003c= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "APPLE-SA-2007-12-17", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "RHSA-2007:1076", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "ADV-2008-0637", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "python-imageop-bo(36653)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=192876", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "name": "http://docs.info.apple.com/article.html?artnum=307179", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "27562", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27562" }, { "name": "USN-585-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "name": "GLSA-200711-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "name": "MDVSA-2008:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "name": "http://support.avaya.com/css/P8/documents/100074697", "refsource": "CONFIRM", "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "name": "31255", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31255" }, { "name": "20080212 FLEA-2008-0002-1 python", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "name": "MDVSA-2008:013", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "name": "DSA-1620", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1620" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "https://issues.rpath.com/browse/RPL-1885", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1885" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "29889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29889" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4965", "datePublished": "2007-09-18T22:00:00", "dateReserved": "2007-09-18T00:00:00", "dateUpdated": "2024-08-07T15:17:27.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-4965\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-09-18T22:17:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de entero en el m\u00f3dulo imageop de Python 2.5.1 y anteriores permiten a atacantes locales o remotos (dependiendo del contexto) provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) y posiblemente obtener informaci\u00f3n sensible (contenidos de memoria) mediante argumentos manipulados para (1) el m\u00e9todo tovideo, y otros vectores no especificados relacionados con (2) imageop.c, (3) rbgimgmodule.c, y otros archivos, que disparan desbordamientos de b\u00fafer basado en mont\u00edculo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.1\",\"matchCriteriaId\":\"E17596CE-794B-43AF-BD92-CB3C490B3CB4\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=192876\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307179\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26837\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27460\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27562\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27872\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28136\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28480\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28838\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29303\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29889\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31255\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/33937\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38675\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3438\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/css/P8/documents/100074697\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1551\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1620\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:013\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/487990/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25696\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-585-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3201\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4238\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36653\",\"source\":\"cve@mitre.org\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1885\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=192876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://docs.info.apple.com/article.html?artnum=307179\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/26837\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/27872\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/28838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/29889\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/31492\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/33937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.apple.com/kb/HT3438\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.avaya.com/css/P8/documents/100074697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/487990/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/25696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-585-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-352A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/3201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/4238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/36653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"VDB Entry\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-1885\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\\n\",\"lastModified\":\"2007-10-15T00:00:00\"}]}}" } }
rhsa-2007_1076
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python\u0027s pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:1076", "url": "https://access.redhat.com/errata/RHSA-2007:1076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2024-11-22T02:05:15+00:00", "generator": { "date": "2024-11-22T02:05:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:1076", "initial_release_date": "2007-12-10T18:20:00+00:00", "revision_history": [ { "date": "2007-12-10T18:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-12-10T13:41:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:05:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ia64", "product": { "name": "python-devel-0:2.2.3-6.8.ia64", "product_id": "python-devel-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ia64", "product": { "name": "python-tools-0:2.2.3-6.8.ia64", "product_id": "python-tools-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ia64", "product": { "name": "tkinter-0:2.2.3-6.8.ia64", "product_id": "tkinter-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ia64", "product": { "name": "python-0:2.2.3-6.8.ia64", "product_id": "python-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product_id": "python-debuginfo-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.x86_64", "product": { "name": "python-devel-0:2.2.3-6.8.x86_64", "product_id": "python-devel-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.x86_64", "product": { "name": "python-tools-0:2.2.3-6.8.x86_64", "product_id": "python-tools-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.x86_64", "product": { "name": "tkinter-0:2.2.3-6.8.x86_64", "product_id": "tkinter-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.x86_64", "product": { "name": "python-0:2.2.3-6.8.x86_64", "product_id": "python-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_id": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.i386", "product": { "name": "python-devel-0:2.2.3-6.8.i386", "product_id": "python-devel-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.i386", "product": { "name": "python-tools-0:2.2.3-6.8.i386", "product_id": "python-tools-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.i386", "product": { "name": "tkinter-0:2.2.3-6.8.i386", "product_id": "tkinter-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.i386", "product": { "name": "python-0:2.2.3-6.8.i386", "product_id": "python-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.i386", "product": { "name": "python-debuginfo-0:2.2.3-6.8.i386", "product_id": "python-debuginfo-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.2.3-6.8.src", "product": { "name": "python-0:2.2.3-6.8.src", "product_id": "python-0:2.2.3-6.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=src" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.src", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.src", "product_id": "python-0:2.3.4-14.4.el4_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ppc", "product": { "name": "python-devel-0:2.2.3-6.8.ppc", "product_id": "python-devel-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ppc", "product": { "name": "python-tools-0:2.2.3-6.8.ppc", "product_id": "python-tools-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ppc", "product": { "name": "tkinter-0:2.2.3-6.8.ppc", "product_id": "tkinter-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ppc", "product": { "name": "python-0:2.2.3-6.8.ppc", "product_id": "python-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product_id": "python-debuginfo-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390x", "product": { "name": "python-devel-0:2.2.3-6.8.s390x", "product_id": "python-devel-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390x", "product": { "name": "python-tools-0:2.2.3-6.8.s390x", "product_id": "python-tools-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390x", "product": { "name": "tkinter-0:2.2.3-6.8.s390x", "product_id": "tkinter-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390x", "product": { "name": "python-0:2.2.3-6.8.s390x", "product_id": "python-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product_id": "python-debuginfo-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390", "product": { "name": "python-devel-0:2.2.3-6.8.s390", "product_id": "python-devel-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390", "product": { "name": "python-tools-0:2.2.3-6.8.s390", "product_id": "python-tools-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390", "product": { "name": "tkinter-0:2.2.3-6.8.s390", "product_id": "tkinter-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390", "product": { "name": "python-0:2.2.3-6.8.s390", "product_id": "python-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390", "product_id": "python-debuginfo-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-7228", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "383371" } ], "notes": [ { "category": "description", "text": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-7228" }, { "category": "external", "summary": "RHBZ#383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-7228", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228" } ], "release_date": "2007-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "pcre integer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
RHSA-2007:1076
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python\u0027s pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:1076", "url": "https://access.redhat.com/errata/RHSA-2007:1076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2025-10-09T12:52:51+00:00", "generator": { "date": "2025-10-09T12:52:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2007:1076", "initial_release_date": "2007-12-10T18:20:00+00:00", "revision_history": [ { "date": "2007-12-10T18:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-12-10T13:41:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:52:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ia64", "product": { "name": "python-devel-0:2.2.3-6.8.ia64", "product_id": "python-devel-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ia64", "product": { "name": "python-tools-0:2.2.3-6.8.ia64", "product_id": "python-tools-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ia64", "product": { "name": "tkinter-0:2.2.3-6.8.ia64", "product_id": "tkinter-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ia64", "product": { "name": "python-0:2.2.3-6.8.ia64", "product_id": "python-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product_id": "python-debuginfo-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.x86_64", "product": { "name": "python-devel-0:2.2.3-6.8.x86_64", "product_id": "python-devel-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.x86_64", "product": { "name": "python-tools-0:2.2.3-6.8.x86_64", "product_id": "python-tools-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.x86_64", "product": { "name": "tkinter-0:2.2.3-6.8.x86_64", "product_id": "tkinter-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.x86_64", "product": { "name": "python-0:2.2.3-6.8.x86_64", "product_id": "python-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_id": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.i386", "product": { "name": "python-devel-0:2.2.3-6.8.i386", "product_id": "python-devel-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.i386", "product": { "name": "python-tools-0:2.2.3-6.8.i386", "product_id": "python-tools-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.i386", "product": { "name": "tkinter-0:2.2.3-6.8.i386", "product_id": "tkinter-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.i386", "product": { "name": "python-0:2.2.3-6.8.i386", "product_id": "python-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.i386", "product": { "name": "python-debuginfo-0:2.2.3-6.8.i386", "product_id": "python-debuginfo-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.2.3-6.8.src", "product": { "name": "python-0:2.2.3-6.8.src", "product_id": "python-0:2.2.3-6.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=src" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.src", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.src", "product_id": "python-0:2.3.4-14.4.el4_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ppc", "product": { "name": "python-devel-0:2.2.3-6.8.ppc", "product_id": "python-devel-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ppc", "product": { "name": "python-tools-0:2.2.3-6.8.ppc", "product_id": "python-tools-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ppc", "product": { "name": "tkinter-0:2.2.3-6.8.ppc", "product_id": "tkinter-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ppc", "product": { "name": "python-0:2.2.3-6.8.ppc", "product_id": "python-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product_id": "python-debuginfo-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390x", "product": { "name": "python-devel-0:2.2.3-6.8.s390x", "product_id": "python-devel-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390x", "product": { "name": "python-tools-0:2.2.3-6.8.s390x", "product_id": "python-tools-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390x", "product": { "name": "tkinter-0:2.2.3-6.8.s390x", "product_id": "tkinter-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390x", "product": { "name": "python-0:2.2.3-6.8.s390x", "product_id": "python-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product_id": "python-debuginfo-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390", "product": { "name": "python-devel-0:2.2.3-6.8.s390", "product_id": "python-devel-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390", "product": { "name": "python-tools-0:2.2.3-6.8.s390", "product_id": "python-tools-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390", "product": { "name": "tkinter-0:2.2.3-6.8.s390", "product_id": "tkinter-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390", "product": { "name": "python-0:2.2.3-6.8.s390", "product_id": "python-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390", "product_id": "python-debuginfo-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-7228", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "383371" } ], "notes": [ { "category": "description", "text": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-7228" }, { "category": "external", "summary": "RHBZ#383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-7228", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228" } ], "release_date": "2007-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "pcre integer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
RHSA-2008:0525
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0525", "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0525", "initial_release_date": "2008-06-30T15:36:00+00:00", "revision_history": [ { "date": "2008-06-30T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-30T11:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el3" } } }, { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008_0629
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function\u0027s handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0629", "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:58:01+00:00", "generator": { "date": "2024-11-22T01:58:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0629", "initial_release_date": "2008-08-13T14:16:00+00:00", "revision_history": [ { "date": "2008-08-13T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:16:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:58:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008:0525
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0525", "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0525", "initial_release_date": "2008-06-30T15:36:00+00:00", "revision_history": [ { "date": "2008-06-30T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-30T11:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el3" } } }, { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008:0264
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0264", "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0264", "initial_release_date": "2008-05-20T14:15:00+00:00", "revision_history": [ { "date": "2008-05-20T14:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T10:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.0:el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2009:1176
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter\u0027s\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter\u0027s\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter\u0027s privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1176", "url": "https://access.redhat.com/errata/RHSA-2009:1176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2025-10-09T12:53:03+00:00", "generator": { "date": "2025-10-09T12:53:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2009:1176", "initial_release_date": "2009-07-27T09:22:00+00:00", "revision_history": [ { "date": "2009-07-27T09:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-07-27T05:22:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:53:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_id": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_id": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-0:2.4.3-24.el5_3.6.i386", "product_id": "python-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_id": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.src", "product": { "name": "python-0:2.4.3-24.el5_3.6.src", "product_id": "python-0:2.4.3-24.el5_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_id": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" }, { "cve": "CVE-2008-1721", "discovery_date": "2008-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "442005" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: integer signedness error in the zlib extension module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1721" }, { "category": "external", "summary": "RHBZ#442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721" } ], "release_date": "2008-04-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: integer signedness error in the zlib extension module" }, { "cve": "CVE-2008-1887", "discovery_date": "2008-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "443810" } ], "notes": [ { "category": "description", "text": "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: PyString_FromStringAndSize does not check for negative size values", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1887" }, { "category": "external", "summary": "RHBZ#443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887" } ], "release_date": "2008-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: PyString_FromStringAndSize does not check for negative size values" }, { "acknowledgments": [ { "names": [ "David Remahl" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2008-2315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455008" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows in python core", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2315" }, { "category": "external", "summary": "RHBZ#455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315" } ], "release_date": "2008-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows in python core" }, { "cve": "CVE-2008-3142", "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454990" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple buffer overflows in unicode processing", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3142" }, { "category": "external", "summary": "RHBZ#454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3142", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142" } ], "release_date": "2008-04-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple buffer overflows in unicode processing" }, { "cve": "CVE-2008-3143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455013" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows discovered by Google", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3143" }, { "category": "external", "summary": "RHBZ#455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143" } ], "release_date": "2008-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows discovered by Google" }, { "cve": "CVE-2008-3144", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455018" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3144" }, { "category": "external", "summary": "RHBZ#455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3144", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144" } ], "release_date": "2008-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function" }, { "cve": "CVE-2008-4864", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "469656" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: imageop module multiple integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4864" }, { "category": "external", "summary": "RHBZ#469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4864", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: imageop module multiple integer overflows" }, { "cve": "CVE-2008-5031", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "470915" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: stringobject, unicodeobject integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5031" }, { "category": "external", "summary": "RHBZ#470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: stringobject, unicodeobject integer overflows" } ] }
rhsa-2008_0264
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0264", "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:54+00:00", "generator": { "date": "2024-11-22T01:57:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0264", "initial_release_date": "2008-05-20T14:15:00+00:00", "revision_history": [ { "date": "2008-05-20T14:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T10:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.0:el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
RHSA-2009:1176
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter\u0027s\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter\u0027s\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter\u0027s privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1176", "url": "https://access.redhat.com/errata/RHSA-2009:1176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2025-10-09T12:53:03+00:00", "generator": { "date": "2025-10-09T12:53:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2009:1176", "initial_release_date": "2009-07-27T09:22:00+00:00", "revision_history": [ { "date": "2009-07-27T09:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-07-27T05:22:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:53:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_id": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_id": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-0:2.4.3-24.el5_3.6.i386", "product_id": "python-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_id": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.src", "product": { "name": "python-0:2.4.3-24.el5_3.6.src", "product_id": "python-0:2.4.3-24.el5_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_id": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" }, { "cve": "CVE-2008-1721", "discovery_date": "2008-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "442005" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: integer signedness error in the zlib extension module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1721" }, { "category": "external", "summary": "RHBZ#442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721" } ], "release_date": "2008-04-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: integer signedness error in the zlib extension module" }, { "cve": "CVE-2008-1887", "discovery_date": "2008-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "443810" } ], "notes": [ { "category": "description", "text": "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: PyString_FromStringAndSize does not check for negative size values", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1887" }, { "category": "external", "summary": "RHBZ#443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887" } ], "release_date": "2008-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: PyString_FromStringAndSize does not check for negative size values" }, { "acknowledgments": [ { "names": [ "David Remahl" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2008-2315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455008" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows in python core", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2315" }, { "category": "external", "summary": "RHBZ#455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315" } ], "release_date": "2008-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows in python core" }, { "cve": "CVE-2008-3142", "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454990" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple buffer overflows in unicode processing", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3142" }, { "category": "external", "summary": "RHBZ#454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3142", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142" } ], "release_date": "2008-04-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple buffer overflows in unicode processing" }, { "cve": "CVE-2008-3143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455013" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows discovered by Google", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3143" }, { "category": "external", "summary": "RHBZ#455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143" } ], "release_date": "2008-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows discovered by Google" }, { "cve": "CVE-2008-3144", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455018" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3144" }, { "category": "external", "summary": "RHBZ#455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3144", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144" } ], "release_date": "2008-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function" }, { "cve": "CVE-2008-4864", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "469656" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: imageop module multiple integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4864" }, { "category": "external", "summary": "RHBZ#469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4864", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: imageop module multiple integer overflows" }, { "cve": "CVE-2008-5031", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "470915" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: stringobject, unicodeobject integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5031" }, { "category": "external", "summary": "RHBZ#470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: stringobject, unicodeobject integer overflows" } ] }
rhsa-2009_1176
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nWhen the assert() system call was disabled, an input sanitization flaw was\nrevealed in the Python string object implementation that led to a buffer\noverflow. The missing check for negative size values meant the Python\nmemory allocator could allocate less memory than expected. This could\nresult in arbitrary code execution with the Python interpreter\u0027s\nprivileges. (CVE-2008-1887)\n\nMultiple buffer and integer overflow flaws were found in the Python Unicode\nstring processing and in the Python Unicode and string object\nimplementations. An attacker could use these flaws to cause a denial of\nservice (Python application crash). (CVE-2008-3142, CVE-2008-5031)\n\nMultiple integer overflow flaws were found in the Python imageop module. If\na Python application used the imageop module to process untrusted images,\nit could cause the application to disclose sensitive information, crash or,\npotentially, execute arbitrary code with the Python interpreter\u0027s\nprivileges. (CVE-2007-4965, CVE-2008-4864)\n\nMultiple integer underflow and overflow flaws were found in the Python\nsnprintf() wrapper implementation. An attacker could use these flaws to\ncause a denial of service (memory corruption). (CVE-2008-3144)\n\nMultiple integer overflow flaws were found in various Python modules. An\nattacker could use these flaws to cause a denial of service (Python\napplication crash). (CVE-2008-2315, CVE-2008-3143)\n\nAn integer signedness error, leading to a buffer overflow, was found\nin the Python zlib extension module. If a Python application requested\nthe negative byte count be flushed for a decompression stream, it could\ncause the application to crash or, potentially, execute arbitrary code\nwith the Python interpreter\u0027s privileges. (CVE-2008-1721)\n\nA flaw was discovered in the strxfrm() function of the Python locale\nmodule. Strings generated by this function were not properly\nNULL-terminated, which could possibly cause disclosure of data stored in\nthe memory of a Python application using this function. (CVE-2007-2052)\n\nRed Hat would like to thank David Remahl of the Apple Product Security team\nfor responsibly reporting the CVE-2008-2315 issue.\n\nAll Python users should upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1176", "url": "https://access.redhat.com/errata/RHSA-2009:1176" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1176.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2024-11-22T02:31:38+00:00", "generator": { "date": "2024-11-22T02:31:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1176", "initial_release_date": "2009-07-27T09:22:00+00:00", "revision_history": [ { "date": "2009-07-27T09:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-07-27T05:22:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:31:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_id": "python-devel-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_id": "tkinter-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-0:2.4.3-24.el5_3.6.i386", "product_id": "python-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_id": "python-tools-0:2.4.3-24.el5_3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.src", "product": { "name": "python-0:2.4.3-24.el5_3.6.src", "product_id": "python-0:2.4.3-24.el5_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc64" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_id": "tkinter-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-devel-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_id": "python-tools-0:2.4.3-24.el5_3.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_id": "tkinter-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_id": "python-tools-0:2.4.3-24.el5_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.4.3-24.el5_3.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_id": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.4.3-24.el5_3.6?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_id": "python-devel-0:2.4.3-24.el5_3.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.4.3-24.el5_3.6?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.src" }, "product_reference": "python-0:2.4.3-24.el5_3.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-devel-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "python-tools-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.i386" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.4.3-24.el5_3.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" }, "product_reference": "tkinter-0:2.4.3-24.el5_3.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" }, { "cve": "CVE-2008-1721", "discovery_date": "2008-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "442005" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: integer signedness error in the zlib extension module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=442005\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1721" }, { "category": "external", "summary": "RHBZ#442005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=442005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1721" } ], "release_date": "2008-04-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: integer signedness error in the zlib extension module" }, { "cve": "CVE-2008-1887", "discovery_date": "2008-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "443810" } ], "notes": [ { "category": "description", "text": "Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: PyString_FromStringAndSize does not check for negative size values", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1887" }, { "category": "external", "summary": "RHBZ#443810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1887" } ], "release_date": "2008-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: PyString_FromStringAndSize does not check for negative size values" }, { "acknowledgments": [ { "names": [ "David Remahl" ], "organization": "Apple Product Security team" } ], "cve": "CVE-2008-2315", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455008" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows in python core", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2315" }, { "category": "external", "summary": "RHBZ#455008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2315" } ], "release_date": "2008-07-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows in python core" }, { "cve": "CVE-2008-3142", "discovery_date": "2008-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "454990" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple buffer overflows in unicode processing", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3142" }, { "category": "external", "summary": "RHBZ#454990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3142", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3142" } ], "release_date": "2008-04-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple buffer overflows in unicode processing" }, { "cve": "CVE-2008-3143", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455013" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by \"checks for integer overflows, contributed by Google.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Multiple integer overflows discovered by Google", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3143" }, { "category": "external", "summary": "RHBZ#455013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455013" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3143" } ], "release_date": "2008-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Multiple integer overflows discovered by Google" }, { "cve": "CVE-2008-3144", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "455018" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3144" }, { "category": "external", "summary": "RHBZ#455018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3144", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3144" } ], "release_date": "2008-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: Potential integer underflow and overflow in the PyOS_vsnprintf C API function" }, { "cve": "CVE-2008-4864", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "469656" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: imageop module multiple integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4864" }, { "category": "external", "summary": "RHBZ#469656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4864", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4864" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: imageop module multiple integer overflows" }, { "cve": "CVE-2008-5031", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "470915" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: stringobject, unicodeobject integer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5031" }, { "category": "external", "summary": "RHBZ#470915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5031" } ], "release_date": "2008-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-27T09:22:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:python-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.src", "5Client-Workstation:python-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client-Workstation:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-0:2.4.3-24.el5_3.6.i386", "5Client:python-0:2.4.3-24.el5_3.6.ia64", "5Client:python-0:2.4.3-24.el5_3.6.ppc", "5Client:python-0:2.4.3-24.el5_3.6.s390x", "5Client:python-0:2.4.3-24.el5_3.6.src", "5Client:python-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Client:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-devel-0:2.4.3-24.el5_3.6.i386", "5Client:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Client:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390", "5Client:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Client:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Client:python-tools-0:2.4.3-24.el5_3.6.i386", "5Client:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Client:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Client:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Client:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Client:tkinter-0:2.4.3-24.el5_3.6.i386", "5Client:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Client:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Client:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Client:tkinter-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-0:2.4.3-24.el5_3.6.i386", "5Server:python-0:2.4.3-24.el5_3.6.ia64", "5Server:python-0:2.4.3-24.el5_3.6.ppc", "5Server:python-0:2.4.3-24.el5_3.6.s390x", "5Server:python-0:2.4.3-24.el5_3.6.src", "5Server:python-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.i386", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ia64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.s390x", "5Server:python-debuginfo-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-devel-0:2.4.3-24.el5_3.6.i386", "5Server:python-devel-0:2.4.3-24.el5_3.6.ia64", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc", "5Server:python-devel-0:2.4.3-24.el5_3.6.ppc64", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390", "5Server:python-devel-0:2.4.3-24.el5_3.6.s390x", "5Server:python-devel-0:2.4.3-24.el5_3.6.x86_64", "5Server:python-tools-0:2.4.3-24.el5_3.6.i386", "5Server:python-tools-0:2.4.3-24.el5_3.6.ia64", "5Server:python-tools-0:2.4.3-24.el5_3.6.ppc", "5Server:python-tools-0:2.4.3-24.el5_3.6.s390x", "5Server:python-tools-0:2.4.3-24.el5_3.6.x86_64", "5Server:tkinter-0:2.4.3-24.el5_3.6.i386", "5Server:tkinter-0:2.4.3-24.el5_3.6.ia64", "5Server:tkinter-0:2.4.3-24.el5_3.6.ppc", "5Server:tkinter-0:2.4.3-24.el5_3.6.s390x", "5Server:tkinter-0:2.4.3-24.el5_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1176" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python: stringobject, unicodeobject integer overflows" } ] }
rhsa-2008:0629
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function\u0027s handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0629", "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0629", "initial_release_date": "2008-08-13T14:16:00+00:00", "revision_history": [ { "date": "2008-08-13T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:16:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
RHSA-2008:0264
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.0.2 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nTwo denial-of-service flaws were fixed in ZLib. (CVE-2005-2096,\nCVE-2005-1849)\n\nMultiple flaws were fixed in OpenSSL. (CVE-2006-4343, CVE-2006-4339,\nCVE-2006-3738, CVE-2006-2940, CVE-2006-2937, CVE-2005-2969)\n\nMultiple flaws were fixed in Python. (CVE-2007-4965, CVE-2007-2052,\nCVE-2006-4980, CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server 5.0.1 are advised to upgrade to\n5.0.2, which resolves these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0264", "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0264.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0264", "initial_release_date": "2008-05-20T14:15:00+00:00", "revision_history": [ { "date": "2008-05-20T14:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-05-20T10:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.0:el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite 5.0 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-05-20T14:15:00+00:00", "details": "This update is available via Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://www.redhat.com/docs/manuals/satellite/Red_Hat_Network_Satellite-5.0.0/html/Installation_Guide/s1-maintenance-update.html", "product_ids": [ "4AS-RHNSAT5:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT5:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0264" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
RHSA-2008:0629
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 5.1.1 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in components\nshipped as part of the Red Hat Network Satellite Server Solaris client. In\na typical operating environment, these components are not used by the\nSatellite Server in a vulnerable manner. These security updates will reduce\nrisk should these components be used by other applications.\n\nSeveral flaws in Zlib were discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream was opened by a user. (CVE-2005-2096, CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 was used an attacker could, potentially, forge a PKCS\n#1 v1.5 signature that would be incorrectly verified by implementations\nthat do not check for excess data in the RSA exponentiation result of the\nsignature. This issue affected applications that use OpenSSL to verify\nX.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around was\nvulnerable to a man-in-the-middle attack which allowed a remote user to\nforce an SSL connection to use SSL 2.0, rather than a stronger protocol,\nsuch as SSL 3.0 or TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures, an error\ncondition was mishandled. This could result in an infinite loop which\nconsumed system memory (CVE-2006-2937).\n\nCertain public key types could take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the Python repr() function\u0027s handling of\nUTF-32/UCS-4 strings. If an application used the repr() function on\nuntrusted data, this could lead to a denial of service or, possibly, allow\nthe execution of arbitrary code with the privileges of the application\nusing the flawed function. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\ncould, potentially, cause disclosure of data stored in the memory of an\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application used the imageop module to process untrusted images, it\ncould cause the application to crash, enter an infinite loop, or, possibly,\nexecute arbitrary code with the privileges of the Python interpreter.\n(CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0629", "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0629.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2025-10-09T12:43:36+00:00", "generator": { "date": "2025-10-09T12:43:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2008:0629", "initial_release_date": "2008-08-13T14:16:00+00:00", "revision_history": [ { "date": "2008-08-13T14:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-13T10:16:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:43:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.1.1-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_1_1_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.1.1-3.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.1.1-3.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-13T14:16:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-RHNSAT5.1:rhn-solaris-bootstrap-0:5.1.1-3.noarch", "4AS-RHNSAT5.1:rhn_solaris_bootstrap_5_1_1_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0629" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2008_0525
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Network Satellite Server version 4.2.3 is now available. This\nupdate includes fixes for a number of security issues in Red Hat Network\nSatellite Server Solaris client components.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "This release corrects several security vulnerabilities in various\ncomponents shipped as part of the Red Hat Network Satellite Server Solaris\nclient. In a typical operating environment, these components are not used\nby the Satellite Server in a vulnerable manner. These security updates will\nreduce risk should these components be used by other applications.\n\nSeveral flaws in Zlib was discovered. An attacker could create a\ncarefully-crafted compressed stream that would cause an application to\ncrash if the stream is opened by a user. (CVE-2005-2096). An attacker\ncould create a carefully crafted compressed stream that would cause an\napplication to crash if the stream is opened by a user. (CVE-2005-1849)\n\nA buffer overflow was discovered in the OpenSSL SSL_get_shared_ciphers()\nutility function. An attacker could send a list of ciphers to an\napplication that used this function and overrun a buffer (CVE-2006-3738).\n\nA flaw in the SSLv2 client code was discovered. If a client application\nused OpenSSL to create an SSLv2 connection to a malicious server, that\nserver could cause the client to crash. (CVE-2006-4343)\n\nAn attack on OpenSSL PKCS #1 v1.5 signatures was discovered. Where an RSA\nkey with exponent 3 is used it may be possible for an attacker to forge a\nPKCS #1 v1.5 signature that would be incorrectly verified by\nimplementations that do not check for excess data in the RSA exponentiation\nresult of the signature. This issue affected applications that use OpenSSL\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\n(CVE-2006-4339)\n\nOpenSSL contained a software work-around for a bug in SSL handling in\nMicrosoft Internet Explorer version 3.0.2. It is enabled in most servers\nthat use OpenSSL to provide support for SSL and TLS. This work-around could\nallow an attacker, acting as a \"man in the middle\" to force an SSL\nconnection to use SSL 2.0 rather than a stronger protocol, such as SSL 3.0\nor TLS 1.0. (CVE-2005-2969)\n\nDuring OpenSSL parsing of certain invalid ASN.1 structures an error\ncondition was mishandled. This can result in an infinite loop which\nconsumed system memory (CVE-2006-2937). \n\nCertain public key types can take disproportionate amounts of time to\nprocess in OpenSSL, leading to a denial of service. (CVE-2006-2940)\n\nA flaw was discovered in the way that the Python repr() function handled\nUTF-32/UCS-4 strings. If an application written in Python used the repr()\nfunction on untrusted data, this could lead to a denial of service or\npossibly allow the execution of arbitrary code with the privileges of the\nPython application. (CVE-2006-4980)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nA stack-based buffer overflow was discovered in the Python interpreter,\nwhich could allow a local user to gain privileges by running a script with\na long name from the current working directory. (CVE-2006-1542)\n\nUsers of Red Hat Network Satellite Server should upgrade to these updated\npackages, which contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0525", "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0525.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update", "tracking": { "current_release_date": "2024-11-22T01:57:58+00:00", "generator": { "date": "2024-11-22T01:57:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0525", "initial_release_date": "2008-06-30T15:36:00+00:00", "revision_history": [ { "date": "2008-06-30T15:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-06-30T11:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:57:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el3" } } }, { "category": "product_name", "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:4.2::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_id": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn-solaris-bootstrap@5.0.2-3?arch=noarch" } } }, { "category": "product_version", "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_id": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhn_solaris_bootstrap_5_0_2_3@1-0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.3 AS)", "product_id": "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "3AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn-solaris-bootstrap-0:5.0.2-3.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch" }, "product_reference": "rhn-solaris-bootstrap-0:5.0.2-3.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch as a component of Red Hat Satellite v 4.2 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" }, "product_reference": "rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "relates_to_product_reference": "4AS-RHNSAT4.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-1849", "discovery_date": "2006-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430649" } ], "notes": [ { "category": "description", "text": "inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1849" }, { "category": "external", "summary": "RHBZ#430649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1849", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" } ], "release_date": "2005-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2096", "discovery_date": "2006-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430650" } ], "notes": [ { "category": "description", "text": "zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2096" }, { "category": "external", "summary": "RHBZ#430650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2096", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" } ], "release_date": "2005-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zlib DoS" }, { "cve": "CVE-2005-2969", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430660" } ], "notes": [ { "category": "description", "text": "The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl mitm downgrade attack", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2969" }, { "category": "external", "summary": "RHBZ#430660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430660" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2969", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2969" } ], "release_date": "2005-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl mitm downgrade attack" }, { "cve": "CVE-2006-1542", "discovery_date": "2006-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430640" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a \"stack overflow,\" and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "python buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-1542" }, { "category": "external", "summary": "RHBZ#430640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-1542", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1542" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1542" } ], "release_date": "2005-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python buffer overflow" }, { "cve": "CVE-2006-2937", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430655" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl ASN.1 DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2937" }, { "category": "external", "summary": "RHBZ#430655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430655" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2937", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2937" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl ASN.1 DoS" }, { "cve": "CVE-2006-2940", "discovery_date": "2006-07-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430654" } ], "notes": [ { "category": "description", "text": "OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) \"public exponent\" or (2) \"public modulus\" values in X.509 certificates that require extra time to process when using RSA signature verification.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl public key DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2940" }, { "category": "external", "summary": "RHBZ#430654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2940" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl public key DoS" }, { "cve": "CVE-2006-3738", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430652" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl get_shared_ciphers overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3738" }, { "category": "external", "summary": "RHBZ#430652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3738" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl get_shared_ciphers overflow" }, { "cve": "CVE-2006-4339", "discovery_date": "2006-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430659" } ], "notes": [ { "category": "description", "text": "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4339" }, { "category": "external", "summary": "RHBZ#430659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430659" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4339", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4339" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4339" } ], "release_date": "2006-09-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl signature forgery" }, { "cve": "CVE-2006-4343", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430651" } ], "notes": [ { "category": "description", "text": "The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl sslv2 client code", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4343" }, { "category": "external", "summary": "RHBZ#430651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430651" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4343", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4343" } ], "release_date": "2006-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl sslv2 client code" }, { "cve": "CVE-2006-4980", "discovery_date": "2006-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "430641" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.", "title": "Vulnerability description" }, { "category": "summary", "text": "python repr unicode buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4980" }, { "category": "external", "summary": "RHBZ#430641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4980", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4980" } ], "release_date": "2006-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "python repr unicode buffer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-06-30T15:36:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use the Red\nHat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "3AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch", "4AS-RHNSAT4.2:rhn-solaris-bootstrap-0:5.0.2-3.noarch", "4AS-RHNSAT4.2:rhn_solaris_bootstrap_5_0_2_3-0:1-0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0525" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
rhsa-2007:1076
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nAn integer overflow flaw was discovered in the way Python\u0027s pcre module\nhandled certain regular expressions. If a Python application used the pcre\nmodule to compile and execute untrusted regular expressions, it may be\npossible to cause the application to crash, or allow arbitrary code\nexecution with the privileges of the Python interpreter. (CVE-2006-7228)\n\nA flaw was discovered in the strxfrm() function of Python\u0027s locale module.\nStrings generated by this function were not properly NULL-terminated. This\nmay possibly cause disclosure of data stored in the memory of a Python\napplication using this function. (CVE-2007-2052)\n\nMultiple integer overflow flaws were discovered in Python\u0027s imageop module.\nIf an application written in Python used the imageop module to process\nuntrusted images, it could cause the application to crash, enter an\ninfinite loop, or possibly execute arbitrary code with the privileges of\nthe Python interpreter. (CVE-2007-4965)\n\nUsers of Python are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:1076", "url": "https://access.redhat.com/errata/RHSA-2007:1076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1076.json" } ], "title": "Red Hat Security Advisory: python security update", "tracking": { "current_release_date": "2025-10-09T12:52:51+00:00", "generator": { "date": "2025-10-09T12:52:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2007:1076", "initial_release_date": "2007-12-10T18:20:00+00:00", "revision_history": [ { "date": "2007-12-10T18:20:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-12-10T13:41:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T12:52:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ia64", "product": { "name": "python-devel-0:2.2.3-6.8.ia64", "product_id": "python-devel-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ia64", "product": { "name": "python-tools-0:2.2.3-6.8.ia64", "product_id": "python-tools-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ia64", "product": { "name": "tkinter-0:2.2.3-6.8.ia64", "product_id": "tkinter-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ia64", "product": { "name": "python-0:2.2.3-6.8.ia64", "product_id": "python-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ia64", "product_id": "python-debuginfo-0:2.2.3-6.8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ia64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ia64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.x86_64", "product": { "name": "python-devel-0:2.2.3-6.8.x86_64", "product_id": "python-devel-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.x86_64", "product": { "name": "python-tools-0:2.2.3-6.8.x86_64", "product_id": "python-tools-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.x86_64", "product": { "name": "tkinter-0:2.2.3-6.8.x86_64", "product_id": "tkinter-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.x86_64", "product": { "name": "python-0:2.2.3-6.8.x86_64", "product_id": "python-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_id": "python-debuginfo-0:2.2.3-6.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=x86_64" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.i386", "product": { "name": "python-devel-0:2.2.3-6.8.i386", "product_id": "python-devel-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.i386", "product": { "name": "python-tools-0:2.2.3-6.8.i386", "product_id": "python-tools-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.i386", "product": { "name": "tkinter-0:2.2.3-6.8.i386", "product_id": "tkinter-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.i386", "product": { "name": "python-0:2.2.3-6.8.i386", "product_id": "python-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.i386", "product": { "name": "python-debuginfo-0:2.2.3-6.8.i386", "product_id": "python-debuginfo-0:2.2.3-6.8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=i386" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=i386" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "python-0:2.2.3-6.8.src", "product": { "name": "python-0:2.2.3-6.8.src", "product_id": "python-0:2.2.3-6.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=src" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.src", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.src", "product_id": "python-0:2.3.4-14.4.el4_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.ppc", "product": { "name": "python-devel-0:2.2.3-6.8.ppc", "product_id": "python-devel-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.ppc", "product": { "name": "python-tools-0:2.2.3-6.8.ppc", "product_id": "python-tools-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.ppc", "product": { "name": "tkinter-0:2.2.3-6.8.ppc", "product_id": "tkinter-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.ppc", "product": { "name": "python-0:2.2.3-6.8.ppc", "product_id": "python-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product": { "name": "python-debuginfo-0:2.2.3-6.8.ppc", "product_id": "python-debuginfo-0:2.2.3-6.8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=ppc" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=ppc" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390x", "product": { "name": "python-devel-0:2.2.3-6.8.s390x", "product_id": "python-devel-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390x", "product": { "name": "python-tools-0:2.2.3-6.8.s390x", "product_id": "python-tools-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390x", "product": { "name": "tkinter-0:2.2.3-6.8.s390x", "product_id": "tkinter-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390x", "product": { "name": "python-0:2.2.3-6.8.s390x", "product_id": "python-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390x", "product_id": "python-debuginfo-0:2.2.3-6.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390x" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-devel-0:2.2.3-6.8.s390", "product": { "name": "python-devel-0:2.2.3-6.8.s390", "product_id": "python-devel-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.2.3-6.8.s390", "product": { "name": "python-tools-0:2.2.3-6.8.s390", "product_id": "python-tools-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.2.3-6.8.s390", "product": { "name": "tkinter-0:2.2.3-6.8.s390", "product_id": "tkinter-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.2.3-6.8.s390", "product": { "name": "python-0:2.2.3-6.8.s390", "product_id": "python-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.2.3-6.8.s390", "product": { "name": "python-debuginfo-0:2.2.3-6.8.s390", "product_id": "python-debuginfo-0:2.2.3-6.8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.2.3-6.8?arch=s390" } } }, { "category": "product_version", "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-docs@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_id": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.3.4-14.4.el4_6.1?arch=s390" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_id": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.3.4-14.4.el4_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.i386" }, "product_reference": "python-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ia64" }, "product_reference": "python-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.ppc" }, "product_reference": "python-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390" }, "product_reference": "python-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.s390x" }, "product_reference": "python-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.src" }, "product_reference": "python-0:2.2.3-6.8.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-0:2.2.3-6.8.x86_64" }, "product_reference": "python-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.i386" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ia64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.ppc" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.s390x" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-debuginfo-0:2.2.3-6.8.x86_64" }, "product_reference": "python-debuginfo-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.i386" }, "product_reference": "python-devel-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ia64" }, "product_reference": "python-devel-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.ppc" }, "product_reference": "python-devel-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390" }, "product_reference": "python-devel-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.s390x" }, "product_reference": "python-devel-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-devel-0:2.2.3-6.8.x86_64" }, "product_reference": "python-devel-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.i386" }, "product_reference": "python-tools-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ia64" }, "product_reference": "python-tools-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.ppc" }, "product_reference": "python-tools-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390" }, "product_reference": "python-tools-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.s390x" }, "product_reference": "python-tools-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:python-tools-0:2.2.3-6.8.x86_64" }, "product_reference": "python-tools-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.i386" }, "product_reference": "tkinter-0:2.2.3-6.8.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ia64" }, "product_reference": "tkinter-0:2.2.3-6.8.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.ppc" }, "product_reference": "tkinter-0:2.2.3-6.8.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390" }, "product_reference": "tkinter-0:2.2.3-6.8.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.s390x" }, "product_reference": "tkinter-0:2.2.3-6.8.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.2.3-6.8.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:tkinter-0:2.2.3-6.8.x86_64" }, "product_reference": "tkinter-0:2.2.3-6.8.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.src" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" }, "product_reference": "tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-7228", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2007-11-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "383371" } ], "notes": [ { "category": "description", "text": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre integer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-7228" }, { "category": "external", "summary": "RHBZ#383371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-7228", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7228" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228" } ], "release_date": "2007-11-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "pcre integer overflow" }, { "cve": "CVE-2007-2052", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2007-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "235093" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.", "title": "Vulnerability description" }, { "category": "summary", "text": "python off-by-one locale.strxfrm() (possible memory disclosure)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttps://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-2052" }, { "category": "external", "summary": "RHBZ#235093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235093" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2052" } ], "release_date": "2007-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python off-by-one locale.strxfrm() (possible memory disclosure)" }, { "cve": "CVE-2007-4965", "discovery_date": "2007-09-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "295971" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "title": "Vulnerability description" }, { "category": "summary", "text": "python imageop module heap corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4965" }, { "category": "external", "summary": "RHBZ#295971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=295971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" } ], "release_date": "2007-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-12-10T18:20:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:python-0:2.2.3-6.8.i386", "3AS:python-0:2.2.3-6.8.ia64", "3AS:python-0:2.2.3-6.8.ppc", "3AS:python-0:2.2.3-6.8.s390", "3AS:python-0:2.2.3-6.8.s390x", "3AS:python-0:2.2.3-6.8.src", "3AS:python-0:2.2.3-6.8.x86_64", "3AS:python-debuginfo-0:2.2.3-6.8.i386", "3AS:python-debuginfo-0:2.2.3-6.8.ia64", "3AS:python-debuginfo-0:2.2.3-6.8.ppc", "3AS:python-debuginfo-0:2.2.3-6.8.s390", "3AS:python-debuginfo-0:2.2.3-6.8.s390x", "3AS:python-debuginfo-0:2.2.3-6.8.x86_64", "3AS:python-devel-0:2.2.3-6.8.i386", "3AS:python-devel-0:2.2.3-6.8.ia64", "3AS:python-devel-0:2.2.3-6.8.ppc", "3AS:python-devel-0:2.2.3-6.8.s390", "3AS:python-devel-0:2.2.3-6.8.s390x", "3AS:python-devel-0:2.2.3-6.8.x86_64", "3AS:python-tools-0:2.2.3-6.8.i386", "3AS:python-tools-0:2.2.3-6.8.ia64", "3AS:python-tools-0:2.2.3-6.8.ppc", "3AS:python-tools-0:2.2.3-6.8.s390", "3AS:python-tools-0:2.2.3-6.8.s390x", "3AS:python-tools-0:2.2.3-6.8.x86_64", "3AS:tkinter-0:2.2.3-6.8.i386", "3AS:tkinter-0:2.2.3-6.8.ia64", "3AS:tkinter-0:2.2.3-6.8.ppc", "3AS:tkinter-0:2.2.3-6.8.s390", "3AS:tkinter-0:2.2.3-6.8.s390x", "3AS:tkinter-0:2.2.3-6.8.x86_64", "3Desktop:python-0:2.2.3-6.8.i386", "3Desktop:python-0:2.2.3-6.8.ia64", "3Desktop:python-0:2.2.3-6.8.ppc", "3Desktop:python-0:2.2.3-6.8.s390", "3Desktop:python-0:2.2.3-6.8.s390x", "3Desktop:python-0:2.2.3-6.8.src", "3Desktop:python-0:2.2.3-6.8.x86_64", "3Desktop:python-debuginfo-0:2.2.3-6.8.i386", "3Desktop:python-debuginfo-0:2.2.3-6.8.ia64", "3Desktop:python-debuginfo-0:2.2.3-6.8.ppc", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390", "3Desktop:python-debuginfo-0:2.2.3-6.8.s390x", "3Desktop:python-debuginfo-0:2.2.3-6.8.x86_64", "3Desktop:python-devel-0:2.2.3-6.8.i386", "3Desktop:python-devel-0:2.2.3-6.8.ia64", "3Desktop:python-devel-0:2.2.3-6.8.ppc", "3Desktop:python-devel-0:2.2.3-6.8.s390", "3Desktop:python-devel-0:2.2.3-6.8.s390x", "3Desktop:python-devel-0:2.2.3-6.8.x86_64", "3Desktop:python-tools-0:2.2.3-6.8.i386", "3Desktop:python-tools-0:2.2.3-6.8.ia64", "3Desktop:python-tools-0:2.2.3-6.8.ppc", "3Desktop:python-tools-0:2.2.3-6.8.s390", "3Desktop:python-tools-0:2.2.3-6.8.s390x", "3Desktop:python-tools-0:2.2.3-6.8.x86_64", "3Desktop:tkinter-0:2.2.3-6.8.i386", "3Desktop:tkinter-0:2.2.3-6.8.ia64", "3Desktop:tkinter-0:2.2.3-6.8.ppc", "3Desktop:tkinter-0:2.2.3-6.8.s390", "3Desktop:tkinter-0:2.2.3-6.8.s390x", "3Desktop:tkinter-0:2.2.3-6.8.x86_64", "3ES:python-0:2.2.3-6.8.i386", "3ES:python-0:2.2.3-6.8.ia64", "3ES:python-0:2.2.3-6.8.ppc", "3ES:python-0:2.2.3-6.8.s390", "3ES:python-0:2.2.3-6.8.s390x", "3ES:python-0:2.2.3-6.8.src", "3ES:python-0:2.2.3-6.8.x86_64", "3ES:python-debuginfo-0:2.2.3-6.8.i386", "3ES:python-debuginfo-0:2.2.3-6.8.ia64", "3ES:python-debuginfo-0:2.2.3-6.8.ppc", "3ES:python-debuginfo-0:2.2.3-6.8.s390", "3ES:python-debuginfo-0:2.2.3-6.8.s390x", "3ES:python-debuginfo-0:2.2.3-6.8.x86_64", "3ES:python-devel-0:2.2.3-6.8.i386", "3ES:python-devel-0:2.2.3-6.8.ia64", "3ES:python-devel-0:2.2.3-6.8.ppc", "3ES:python-devel-0:2.2.3-6.8.s390", "3ES:python-devel-0:2.2.3-6.8.s390x", "3ES:python-devel-0:2.2.3-6.8.x86_64", "3ES:python-tools-0:2.2.3-6.8.i386", "3ES:python-tools-0:2.2.3-6.8.ia64", "3ES:python-tools-0:2.2.3-6.8.ppc", "3ES:python-tools-0:2.2.3-6.8.s390", "3ES:python-tools-0:2.2.3-6.8.s390x", "3ES:python-tools-0:2.2.3-6.8.x86_64", "3ES:tkinter-0:2.2.3-6.8.i386", "3ES:tkinter-0:2.2.3-6.8.ia64", "3ES:tkinter-0:2.2.3-6.8.ppc", "3ES:tkinter-0:2.2.3-6.8.s390", "3ES:tkinter-0:2.2.3-6.8.s390x", "3ES:tkinter-0:2.2.3-6.8.x86_64", "3WS:python-0:2.2.3-6.8.i386", "3WS:python-0:2.2.3-6.8.ia64", "3WS:python-0:2.2.3-6.8.ppc", "3WS:python-0:2.2.3-6.8.s390", "3WS:python-0:2.2.3-6.8.s390x", "3WS:python-0:2.2.3-6.8.src", "3WS:python-0:2.2.3-6.8.x86_64", "3WS:python-debuginfo-0:2.2.3-6.8.i386", "3WS:python-debuginfo-0:2.2.3-6.8.ia64", "3WS:python-debuginfo-0:2.2.3-6.8.ppc", "3WS:python-debuginfo-0:2.2.3-6.8.s390", "3WS:python-debuginfo-0:2.2.3-6.8.s390x", "3WS:python-debuginfo-0:2.2.3-6.8.x86_64", "3WS:python-devel-0:2.2.3-6.8.i386", "3WS:python-devel-0:2.2.3-6.8.ia64", "3WS:python-devel-0:2.2.3-6.8.ppc", "3WS:python-devel-0:2.2.3-6.8.s390", "3WS:python-devel-0:2.2.3-6.8.s390x", "3WS:python-devel-0:2.2.3-6.8.x86_64", "3WS:python-tools-0:2.2.3-6.8.i386", "3WS:python-tools-0:2.2.3-6.8.ia64", "3WS:python-tools-0:2.2.3-6.8.ppc", "3WS:python-tools-0:2.2.3-6.8.s390", "3WS:python-tools-0:2.2.3-6.8.s390x", "3WS:python-tools-0:2.2.3-6.8.x86_64", "3WS:tkinter-0:2.2.3-6.8.i386", "3WS:tkinter-0:2.2.3-6.8.ia64", "3WS:tkinter-0:2.2.3-6.8.ppc", "3WS:tkinter-0:2.2.3-6.8.s390", "3WS:tkinter-0:2.2.3-6.8.s390x", "3WS:tkinter-0:2.2.3-6.8.x86_64", "4AS:python-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-0:2.3.4-14.4.el4_6.1.src", "4AS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4AS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4AS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-0:2.3.4-14.4.el4_6.1.src", "4Desktop:python-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4Desktop:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-0:2.3.4-14.4.el4_6.1.src", "4ES:python-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4ES:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4ES:tkinter-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-0:2.3.4-14.4.el4_6.1.src", "4WS:python-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-debuginfo-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-devel-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-docs-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.i386", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ia64", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.ppc", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.s390x", "4WS:python-tools-0:2.3.4-14.4.el4_6.1.x86_64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.i386", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ia64", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.ppc", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.s390x", "4WS:tkinter-0:2.3.4-14.4.el4_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1076" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python imageop module heap corruption" } ] }
CERTA-2007-AVI-551
Vulnerability from certfr_avis
None
Description
De multiples vulnérabilités ont été découvertes dans les systèmes d'exploitation Apple Mac OS X. L'exploitation de ces vulnérabilités permettent à une personne malveillante d'exécuter diverses actions dont l'exécution de code arbitraire à distance, l'atteinte à l'intégrité des données, l'élévation de privilèges ou le contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Mac OS X version 10.5.1 et ant\u00e9rieures.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Mac OS X version 10.4.11 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les syst\u00e8mes\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s\npermettent \u00e0 une personne malveillante d\u0027ex\u00e9cuter diverses actions dont\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance, l\u0027atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des\ndonn\u00e9es, l\u0027\u00e9l\u00e9vation de privil\u00e8ges ou le contournement de la politique\nde s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-4710", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4710" }, { "name": "CVE-2007-1661", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1661" }, { "name": "CVE-2007-5857", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5857" }, { "name": "CVE-2007-4351", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4351" }, { "name": "CVE-2007-4768", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4768" }, { "name": "CVE-2007-1660", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1660" }, { "name": "CVE-2007-5116", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5116" }, { "name": "CVE-2007-5851", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5851" }, { "name": "CVE-2007-1659", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1659" }, { "name": "CVE-2007-5476", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5476" }, { "name": "CVE-2007-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3876" }, { "name": "CVE-2007-4708", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4708" }, { "name": "CVE-2007-5853", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5853" }, { "name": "CVE-2007-5398", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5398" }, { "name": "CVE-2007-1218", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1218" }, { "name": "CVE-2007-5848", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5848" }, { "name": "CVE-2007-5770", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5770" }, { "name": "CVE-2007-1662", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1662" }, { "name": "CVE-2007-4709", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4709" }, { "name": "CVE-2007-5863", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5863" }, { "name": "CVE-2007-3798", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3798" }, { "name": "CVE-2006-0024", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0024" }, { "name": "CVE-2007-5849", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5849" }, { "name": "CVE-2007-5858", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5858" }, { "name": "CVE-2007-4131", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4131" }, { "name": "CVE-2007-6165", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6165" }, { "name": "CVE-2007-4572", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4572" }, { "name": "CVE-2007-5855", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5855" }, { "name": "CVE-2007-5854", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5854" }, { "name": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "name": "CVE-2007-5856", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5856" }, { "name": "CVE-2007-5850", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5850" }, { "name": "CVE-2007-5859", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5859" }, { "name": "CVE-2007-5861", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5861" }, { "name": "CVE-2007-5860", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5860" }, { "name": "CVE-2007-4767", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4767" }, { "name": "CVE-2007-4766", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4766" }, { "name": "CVE-2007-5847", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5847" } ], "initial_release_date": "2007-12-19T00:00:00", "last_revision_date": "2007-12-19T00:00:00", "links": [], "reference": "CERTA-2007-AVI-551", "revisions": [ { "description": "version initiale.", "revision_date": "2007-12-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": null, "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple 307179 du 12 d\u00e9cembre 2007", "url": "http://docs.info.apple.com/article.html?artnum=307179" } ] }
CERTA-2009-AVI-513
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
VMware | N/A | VMware Server 2.x ; | ||
VMware | ESXi | VMware ESXi 3.x ; | ||
VMware | N/A | VMware vMA 4.x. | ||
VMware | N/A | VMware ESX Server 4.x ; | ||
VMware | N/A | VMware ESX Server 2.x ; | ||
VMware | N/A | VMware ESX Server 3.x ; | ||
VMware | ESXi | VMware ESXi 4.x ; | ||
VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
VMware | N/A | VMware VirtualCenter 2.x ; |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "VMware Server 2.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESXi 3.x ;", "product": { "name": "ESXi", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware vMA 4.x.", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESX Server 4.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESX Server 2.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESX Server 3.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESXi 4.x ;", "product": { "name": "ESXi", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware vCenter Server 4.x ;", "product": { "name": "vCenter Server", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware VirtualCenter 2.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2009-2724", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2724" }, { "name": "CVE-2009-0676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676" }, { "name": "CVE-2009-2721", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2721" }, { "name": "CVE-2008-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143" }, { "name": "CVE-2009-2692", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2692" }, { "name": "CVE-2009-2406", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406" }, { "name": "CVE-2009-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389" }, { "name": "CVE-2008-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0002" }, { "name": "CVE-2009-1106", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1106" }, { "name": "CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "name": "CVE-2008-4307", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307" }, { "name": "CVE-2009-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1104" }, { "name": "CVE-2009-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407" }, { "name": "CVE-2008-3142", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142" }, { "name": "CVE-2009-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1101" }, { "name": "CVE-2009-2416", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2416" }, { "name": "CVE-2009-1385", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385" }, { "name": "CVE-2009-0746", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0746" }, { "name": "CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "name": "CVE-2007-5966", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966" }, { "name": "CVE-2009-2719", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2719" }, { "name": "CVE-2008-4864", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864" }, { "name": "CVE-2009-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2417" }, { "name": "CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "name": "CVE-2009-0322", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0322" }, { "name": "CVE-2009-1895", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895" }, { "name": "CVE-2009-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094" }, { "name": "CVE-2009-0748", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0748" }, { "name": "CVE-2008-3144", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144" }, { "name": "CVE-2009-0747", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0747" }, { "name": "CVE-2009-0580", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580" }, { "name": "CVE-2009-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1095" }, { "name": "CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "name": "CVE-2009-0675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0675" }, { "name": "CVE-2007-5461", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461" }, { "name": "CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "name": "CVE-2009-1102", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1102" }, { "name": "CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "name": "CVE-2009-0269", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0269" }, { "name": "CVE-2008-3528", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3528" }, { "name": "CVE-2008-5031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031" }, { "name": "CVE-2008-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721" }, { "name": "CVE-2009-1388", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388" }, { "name": "CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "name": "CVE-2009-2720", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2720" }, { "name": "CVE-2009-0834", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834" }, { "name": "CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "name": "CVE-2009-2848", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848" }, { "name": "CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "name": "CVE-2008-1232", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232" }, { "name": "CVE-2009-0159", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159" }, { "name": "CVE-2009-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778" }, { "name": "CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "name": "CVE-2009-1099", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1099" }, { "name": "CVE-2009-1252", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1252" }, { "name": "CVE-2009-2698", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2698" }, { "name": "CVE-2008-2370", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370" }, { "name": "CVE-2009-0033", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033" }, { "name": "CVE-2009-2723", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2723" }, { "name": "CVE-2009-1107", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1107" }, { "name": "CVE-2009-2716", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2716" }, { "name": "CVE-2007-5333", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5333" }, { "name": "CVE-2008-1947", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1947" }, { "name": "CVE-2009-1105", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1105" }, { "name": "CVE-2007-6286", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6286" }, { "name": "CVE-2009-0028", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028" }, { "name": "CVE-2009-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337" }, { "name": "CVE-2009-0781", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781" }, { "name": "CVE-2009-2414", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2414" }, { "name": "CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "name": "CVE-2009-1336", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336" }, { "name": "CVE-2009-0783", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0783" }, { "name": "CVE-2008-5515", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515" }, { "name": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "name": "CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "name": "CVE-2009-2722", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2722" }, { "name": "CVE-2008-5700", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5700" }, { "name": "CVE-2009-1103", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1103" }, { "name": "CVE-2009-1100", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100" }, { "name": "CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "name": "CVE-2007-5342", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342" }, { "name": "CVE-2009-1096", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1096" }, { "name": "CVE-2009-1098", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1098" }, { "name": "CVE-2009-0787", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787" }, { "name": "CVE-2008-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887" }, { "name": "CVE-2009-1097", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1097" }, { "name": "CVE-2009-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2847" }, { "name": "CVE-2008-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315" }, { "name": "CVE-2009-0696", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0696" }, { "name": "CVE-2009-2718", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2718" }, { "name": "CVE-2009-0745", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0745" }, { "name": "CVE-2009-1093", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1093" } ], "initial_release_date": "2009-11-24T00:00:00", "last_revision_date": "2009-11-24T00:00:00", "links": [], "reference": "CERTA-2009-AVI-513", "revisions": [ { "description": "version initiale.", "revision_date": "2009-11-24T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009", "url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html" } ] }
CERTA-2008-AVI-103
Vulnerability from certfr_avis
Plusieurs vulnérabilités dans VMware ESX Server permettent à une personne malintentionnée d'élever ses privilèges, d'atteindre à la confidentialité des données, d'exécuter du code arbitraire ou de provoquer un déni de service.
Description
Plusieurs vulnérabilités dans VMware ESX Server ont été découvertes :
- une erreur dans le pilote aacraid SCSI permet à un utilisateur local de provoquer un déni de service ou une élévation de privilèges ;
- une vulnérabilité dans Samba permet à une personne malveillante ayant accès à la console de service de provoquer un déni de service ou d'exécuter du code arbitraire à distance ;
- plusieurs vunérabilités dans le module python permettent de provoquer un déni de service, d'exécuter du code arbitraire ou d'atteindre à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de VMware pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "VMware ESX Server 2.x ;", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } }, { "description": "VMware ESX Server 3.x.", "product": { "name": "N/A", "vendor": { "name": "VMware", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server ont \u00e9t\u00e9 d\u00e9couvertes :\n\n- une erreur dans le pilote aacraid SCSI permet \u00e0 un utilisateur local\n de provoquer un d\u00e9ni de service ou une \u00e9l\u00e9vation de privil\u00e8ges ;\n- une vuln\u00e9rabilit\u00e9 dans Samba permet \u00e0 une personne malveillante\n ayant acc\u00e8s \u00e0 la console de service de provoquer un d\u00e9ni de service\n ou d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ;\n- plusieurs vun\u00e9rabilit\u00e9s dans le module python permettent de\n provoquer un d\u00e9ni de service, d\u0027ex\u00e9cuter du code arbitraire ou\n d\u0027atteindre \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de VMware pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-6015", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6015" }, { "name": "CVE-2006-7228", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7228" }, { "name": "CVE-2007-4308", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4308" }, { "name": "CVE-2007-2052", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052" }, { "name": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" } ], "initial_release_date": "2008-02-22T00:00:00", "last_revision_date": "2008-02-28T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008 :", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0003.html" } ], "reference": "CERTA-2008-AVI-103", "revisions": [ { "description": "version initiale.", "revision_date": "2008-02-22T00:00:00.000000" }, { "description": "correction du lien vers le bulletin de s\u00e9curit\u00e9 VMware.", "revision_date": "2008-02-28T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server permettent \u00e0 une\npersonne malintentionn\u00e9e d\u0027\u00e9lever ses privil\u00e8ges, d\u0027atteindre \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, d\u0027ex\u00e9cuter du code arbitraire ou de\nprovoquer un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008", "url": null } ] }
CERTA-2009-AVI-068
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le système Mac OS X d'Apple. L'exploitation de ces vulnérabilités permet un grand nombre d'actions, dont l'exécution de code arbitraire à distance.
Description
Apple vient de publier des mises à jour pour son système d'exploitation Mac OS X. Ces correctifs concernent la mise à jour de plusieurs applicatifs :
- AFP Server ;
- Apple Pixlet Video ;
- Carbon Core ;
- CFNetwork ;
- Certificate Assistant ;
- ClamAV ;
- CoreText ;
- CUPS ;
- DS Tools ;
- fetchmail ;
- Folder Manager ;
- FSEvents ;
- Network Time ;
- perl ;
- Printing ;
- python ;
- Remote Apple Events ;
- Safari RSS ;
- servermgrd ;
- SMB ;
- SquirrelMail ;
- X11 ;
- Xterm.
L'exploitation des différentes vulnérabilités permet d'effectuer un grand nombre d'actions malveillantes, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Mac OS X versions 10.5.6 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Mac OS X versions 10.4.11 et ant\u00e9rieures.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nApple vient de publier des mises \u00e0 jour pour son syst\u00e8me d\u0027exploitation\nMac OS X. Ces correctifs concernent la mise \u00e0 jour de plusieurs\napplicatifs :\n\n- AFP Server ;\n- Apple Pixlet Video ;\n- Carbon Core ;\n- CFNetwork ;\n- Certificate Assistant ;\n- ClamAV ;\n- CoreText ;\n- CUPS ;\n- DS Tools ;\n- fetchmail ;\n- Folder Manager ;\n- FSEvents ;\n- Network Time ;\n- perl ;\n- Printing ;\n- python ;\n- Remote Apple Events ;\n- Safari RSS ;\n- servermgrd ;\n- SMB ;\n- SquirrelMail ;\n- X11 ;\n- Xterm.\n\nL\u0027exploitation des diff\u00e9rentes vuln\u00e9rabilit\u00e9s permet d\u0027effectuer un\ngrand nombre d\u0027actions malveillantes, dont l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2008-2316", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2316" }, { "name": "CVE-2008-2361", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2361" }, { "name": "CVE-2008-2379", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2379" }, { "name": "CVE-2008-1808", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1808" }, { "name": "CVE-2009-0020", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0020" }, { "name": "CVE-2009-0012", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0012" }, { "name": "CVE-2008-3663", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3663" }, { "name": "CVE-2009-0141", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0141" }, { "name": "CVE-2008-3142", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142" }, { "name": "CVE-2007-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4565" }, { "name": "CVE-2007-1352", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1352" }, { "name": "CVE-2009-0139", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0139" }, { "name": "CVE-2008-4864", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864" }, { "name": "CVE-2009-0019", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0019" }, { "name": "CVE-2008-1679", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1679" }, { "name": "CVE-2008-2711", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2711" }, { "name": "CVE-2008-3144", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144" }, { "name": "CVE-2008-2362", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2362" }, { "name": "CVE-2009-0018", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0018" }, { "name": "CVE-2009-0140", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0140" }, { "name": "CVE-2009-0015", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0015" }, { "name": "CVE-2008-1379", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1379" }, { "name": "CVE-2008-5031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031" }, { "name": "CVE-2008-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721" }, { "name": "CVE-2008-5050", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5050" }, { "name": "CVE-2006-1861", "url": "https://www.cve.org/CVERecord?id=CVE-2006-1861" }, { "name": "CVE-2008-1927", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1927" }, { "name": "CVE-2007-1667", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1667" }, { "name": "CVE-2008-5183", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5183" }, { "name": "CVE-2009-0138", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0138" }, { "name": "CVE-2009-0014", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0014" }, { "name": "CVE-2009-0009", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0009" }, { "name": "CVE-2009-0137", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0137" }, { "name": "CVE-2008-2360", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2360" }, { "name": "CVE-2009-0142", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0142" }, { "name": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" }, { "name": "CVE-2009-0011", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0011" }, { "name": "CVE-2008-5314", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5314" }, { "name": "CVE-2008-1807", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1807" }, { "name": "CVE-2008-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887" }, { "name": "CVE-2008-1377", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1377" }, { "name": "CVE-2007-1351", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1351" }, { "name": "CVE-2008-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315" }, { "name": "CVE-2009-0013", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0013" }, { "name": "CVE-2009-0017", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0017" }, { "name": "CVE-2006-3467", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3467" }, { "name": "CVE-2008-1806", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1806" } ], "initial_release_date": "2009-02-13T00:00:00", "last_revision_date": "2009-02-13T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Apple HT3438 du 12 f\u00e9vrier 2009 :", "url": "http://support.apple.com/kb/HT3438" } ], "reference": "CERTA-2009-AVI-068", "revisions": [ { "description": "version initiale.", "revision_date": "2009-02-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me Mac OS X\nd\u0027Apple. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet un grand nombre\nd\u0027actions, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple 2009-001 du 12 f\u00e9vrier 2009", "url": null } ] }
CERTA-2008-AVI-018
Vulnerability from certfr_avis
Des vulnérabilités dans le module imapeop de Python permettent à un utilisateur malveillant de provoquer un déni de service ou d'exécuter un code arbitraire à distance.
Description
Des débordements d'entiers ne sont pas correctement gérés dans le module imapeop de Python. Un utilisateur malveillant, capable de soumettre une image spécialement conçue à une application utilisant le module vulnérable, peut provoquer un déni de service ou d'exécuter un code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Applications utilisant le module imageop de Python, versions 2.5.1 et précédentes.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eApplications utilisant le module \u003cSPAN class=\n \"textit\"\u003eimageop\u003c/SPAN\u003e de Python, versions 2.5.1 et pr\u00e9c\u00e9dentes.\u003c/P\u003e", "content": "## Description\n\nDes d\u00e9bordements d\u0027entiers ne sont pas correctement g\u00e9r\u00e9s dans le module\nimapeop de Python. Un utilisateur malveillant, capable de soumettre une\nimage sp\u00e9cialement con\u00e7ue \u00e0 une application utilisant le module\nvuln\u00e9rable, peut provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter un code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" } ], "initial_release_date": "2008-01-15T00:00:00", "last_revision_date": "2008-01-15T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2007:1076 du 10 d\u00e9cembre 2007 :", "url": "http://rhn.redhat.com/errata/RHSA-2007-1076.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200711-07 du 07 novembre 2007 :", "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora FEDORA-2007-2663 du 29 octobre 2007 :", "url": "https://www.redhat.com/archives/fedora-package-annoucnce/2007-October/msg00378.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:013 du 14 janvier 2008 :", "url": "http://www.mandriva.com/archives/security/advisories" }, { "title": "Bulletin de s\u00e9curit\u00e9 Apple 307179 du 02 janvier 2008 :", "url": "http://docs.info.apple.com/article.html?artnum=307179" } ], "reference": "CERTA-2008-AVI-018", "revisions": [ { "description": "version initiale.", "revision_date": "2008-01-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Des vuln\u00e9rabilit\u00e9s dans le module \u003cspan class=\"textit\"\u003eimapeop\u003c/span\u003e de\nPython permettent \u00e0 un utilisateur malveillant de provoquer un d\u00e9ni de\nservice ou d\u0027ex\u00e9cuter un code arbitraire \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Python", "vendor_advisories": [ { "published_at": null, "title": "CVE-2007-4965", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965" } ] }
ghsa-m9f3-5w45-2j8h
Vulnerability from github
Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
{ "affected": [], "aliases": [ "CVE-2007-4965" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-09-18T22:17:00Z", "severity": "MODERATE" }, "details": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "id": "GHSA-m9f3-5w45-2j8h", "modified": "2022-05-01T18:28:39Z", "published": "2022-05-01T18:28:39Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4965" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1885" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "type": "WEB", "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "type": "WEB", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "type": "WEB", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/26837" }, { "type": "WEB", "url": "http://secunia.com/advisories/27460" }, { "type": "WEB", "url": "http://secunia.com/advisories/27562" }, { "type": "WEB", "url": "http://secunia.com/advisories/27872" }, { "type": "WEB", "url": "http://secunia.com/advisories/28136" }, { "type": "WEB", "url": "http://secunia.com/advisories/28480" }, { "type": "WEB", "url": "http://secunia.com/advisories/28838" }, { "type": "WEB", "url": "http://secunia.com/advisories/29032" }, { "type": "WEB", "url": "http://secunia.com/advisories/29303" }, { "type": "WEB", "url": "http://secunia.com/advisories/29889" }, { "type": "WEB", "url": "http://secunia.com/advisories/31255" }, { "type": "WEB", "url": "http://secunia.com/advisories/31492" }, { "type": "WEB", "url": "http://secunia.com/advisories/33937" }, { "type": "WEB", "url": "http://secunia.com/advisories/37471" }, { "type": "WEB", "url": "http://secunia.com/advisories/38675" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3438" }, { "type": "WEB", "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1551" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1620" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25696" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2007-4965
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://bugs.gentoo.org/show_bug.cgi?id=192876 | Third Party Advisory | |
cve@mitre.org | http://docs.info.apple.com/article.html?artnum=307179 | Third Party Advisory | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | Mailing List | |
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | Mailing List | |
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html | Exploit | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | Third Party Advisory | |
cve@mitre.org | http://lists.vmware.com/pipermail/security-announce/2008/000005.html | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/26837 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/27460 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/27562 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/27872 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/28136 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/28480 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/28838 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/29032 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/29303 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/29889 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/31255 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/31492 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/33937 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/37471 | Broken Link | |
cve@mitre.org | http://secunia.com/advisories/38675 | Broken Link | |
cve@mitre.org | http://support.apple.com/kb/HT3438 | Third Party Advisory | |
cve@mitre.org | http://support.avaya.com/css/P8/documents/100074697 | Third Party Advisory | |
cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254 | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2008/dsa-1551 | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2008/dsa-1620 | Third Party Advisory | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml | Third Party Advisory | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:012 | Broken Link | |
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:013 | Broken Link | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2007-1076.html | Third Party Advisory | |
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0629.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/487990/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/archive/1/488457/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/archive/1/507985/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/25696 | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/usn-585-1 | Third Party Advisory | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA07-352A.html | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | Third Party Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3201 | Broken Link | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/4238 | Broken Link | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/0637 | Broken Link | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/3316 | Broken Link | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36653 | VDB Entry | |
cve@mitre.org | https://issues.rpath.com/browse/RPL-1885 | Third Party Advisory | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804 | Broken Link | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486 | Broken Link | |
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496 | Broken Link | |
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=192876 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://docs.info.apple.com/article.html?artnum=307179 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.vmware.com/pipermail/security-announce/2008/000005.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26837 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27460 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27562 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27872 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28136 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28480 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/28838 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29032 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29303 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29889 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31255 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31492 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33937 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37471 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38675 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3438 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/css/P8/documents/100074697 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1551 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1620 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:012 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:013 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2007-1076.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0629.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/487990/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/488457/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507985/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25696 | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-585-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA07-352A.html | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3201 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/4238 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/0637 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3316 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36653 | VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://issues.rpath.com/browse/RPL-1885 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "E17596CE-794B-43AF-BD92-CB3C490B3CB4", "versionEndIncluding": "2.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de entero en el m\u00f3dulo imageop de Python 2.5.1 y anteriores permiten a atacantes locales o remotos (dependiendo del contexto) provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) y posiblemente obtener informaci\u00f3n sensible (contenidos de memoria) mediante argumentos manipulados para (1) el m\u00e9todo tovideo, y otros vectores no especificados relacionados con (2) imageop.c, (3) rbgimgmodule.c, y otros archivos, que disparan desbordamientos de b\u00fafer basado en mont\u00edculo." } ], "id": "CVE-2007-4965", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-09-18T22:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/26837" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27460" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27562" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27872" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28136" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28480" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29032" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29303" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29889" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31255" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31492" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/33937" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37471" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/38675" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3438" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1620" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/25696" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://issues.rpath.com/browse/RPL-1885" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/26837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/33937" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37471" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/38675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/25696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://issues.rpath.com/browse/RPL-1885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\n", "lastModified": "2007-10-15T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2007-4965
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-4965", "description": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "id": "GSD-2007-4965", "references": [ "https://www.suse.com/security/cve/CVE-2007-4965.html", "https://www.debian.org/security/2008/dsa-1620", "https://www.debian.org/security/2008/dsa-1551", "https://access.redhat.com/errata/RHSA-2009:1176", "https://access.redhat.com/errata/RHSA-2008:0629", "https://access.redhat.com/errata/RHSA-2008:0525", "https://access.redhat.com/errata/RHSA-2008:0264", "https://access.redhat.com/errata/RHSA-2007:1076", "https://linux.oracle.com/cve/CVE-2007-4965.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-4965" ], "details": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.", "id": "GSD-2007-4965", "modified": "2023-12-13T01:21:37.016810Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4965", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "MLIST", "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "25696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25696" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "name": "ADV-2007-4238", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "38675", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38675" }, { "name": "TA07-352A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "oval:org.mitre.oval:def:8496", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "name": "33937", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33937" }, { "name": "28136", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28136" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "27460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27460" }, { "name": "28480", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28480" }, { "name": "26837", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26837" }, { "name": "ADV-2007-3201", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "name": "DSA-1551", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1551" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "29303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29303" }, { "name": "oval:org.mitre.oval:def:8486", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "name": "http://support.apple.com/kb/HT3438", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3438" }, { "name": "APPLE-SA-2009-02-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "27872", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27872" }, { "name": "29032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29032" }, { "name": "31492", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31492" }, { "name": "FEDORA-2007-2663", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "name": "oval:org.mitre.oval:def:10804", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "name": "RHSA-2008:0629", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "20070916 python \u003c= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "APPLE-SA-2007-12-17", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "RHSA-2007:1076", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "ADV-2008-0637", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "python-imageop-bo(36653)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=192876", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "name": "http://docs.info.apple.com/article.html?artnum=307179", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "27562", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27562" }, { "name": "USN-585-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "name": "GLSA-200711-07", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "name": "MDVSA-2008:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "name": "http://support.avaya.com/css/P8/documents/100074697", "refsource": "CONFIRM", "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "name": "31255", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31255" }, { "name": "20080212 FLEA-2008-0002-1 python", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" }, { "name": "MDVSA-2008:013", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "name": "DSA-1620", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1620" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "https://issues.rpath.com/browse/RPL-1885", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1885" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "29889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29889" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.5.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4965" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "20070916 python \u003c= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module", "refsource": "FULLDISC", "tags": [ "Exploit" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html" }, { "name": "25696", "refsource": "BID", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/25696" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=192876", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=192876" }, { "name": "https://issues.rpath.com/browse/RPL-1885", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://issues.rpath.com/browse/RPL-1885" }, { "name": "FEDORA-2007-2663", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html" }, { "name": "GLSA-200711-07", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml" }, { "name": "RHSA-2007:1076", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html" }, { "name": "26837", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/26837" }, { "name": "27460", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27460" }, { "name": "27562", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27562" }, { "name": "27872", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/27872" }, { "name": "http://docs.info.apple.com/article.html?artnum=307179", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://docs.info.apple.com/article.html?artnum=307179" }, { "name": "APPLE-SA-2007-12-17", "refsource": "APPLE", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html" }, { "name": "TA07-352A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html" }, { "name": "28136", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28136" }, { "name": "MDVSA-2008:012", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012" }, { "name": "MDVSA-2008:013", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:013" }, { "name": "28480", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28480" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28838", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/28838" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0254" }, { "name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html" }, { "name": "29032", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29032" }, { "name": "USN-585-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-585-1" }, { "name": "29303", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29303" }, { "name": "DSA-1551", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1551" }, { "name": "29889", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/29889" }, { "name": "DSA-1620", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1620" }, { "name": "31255", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31255" }, { "name": "31492", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/31492" }, { "name": "RHSA-2008:0629", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "name": "APPLE-SA-2009-02-12", "refsource": "APPLE", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "name": "33937", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/33937" }, { "name": "http://support.apple.com/kb/HT3438", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3438" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "37471", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37471" }, { "name": "http://support.avaya.com/css/P8/documents/100074697", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/css/P8/documents/100074697" }, { "name": "38675", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/38675" }, { "name": "ADV-2007-4238", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/4238" }, { "name": "ADV-2008-0637", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/0637" }, { "name": "ADV-2007-3201", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2007/3201" }, { "name": "python-imageop-bo(36653)", "refsource": "XF", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36653" }, { "name": "oval:org.mitre.oval:def:8496", "refsource": "OVAL", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496" }, { "name": "oval:org.mitre.oval:def:8486", "refsource": "OVAL", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486" }, { "name": "oval:org.mitre.oval:def:10804", "refsource": "OVAL", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded" }, { "name": "20080212 FLEA-2008-0002-1 python", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/487990/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-08-02T18:52Z", "publishedDate": "2007-09-18T22:17Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.