Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-1036 (GCVE-0-2008-1036)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2009:0296", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "name": "macosx-icu-security-bypass(42717)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "name": "34777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34777" }, { "name": "29488", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29488" }, { "name": "1020139", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020139" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "DSA-1762", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1762" }, { "name": "34290", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34290" }, { "name": "oval:org.mitre.oval:def:10824", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "USN-747-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "name": "29412", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29412" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2009:0296", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "name": "macosx-icu-security-bypass(42717)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "name": "34777", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34777" }, { "name": "29488", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29488" }, { "name": "1020139", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020139" }, { "name": "TA08-150A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "DSA-1762", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1762" }, { "name": "34290", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34290" }, { "name": "oval:org.mitre.oval:def:10824", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "name": "ADV-2008-1697", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "USN-747-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "name": "29412", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29412" }, { "tags": [ "x_refsource_MISC" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:0296", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "name": "macosx-icu-security-bypass(42717)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "name": "34777", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34777" }, { "name": "29488", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29488" }, { "name": "1020139", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020139" }, { "name": "TA08-150A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "DSA-1762", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1762" }, { "name": "34290", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34290" }, { "name": "oval:org.mitre.oval:def:10824", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "name": "ADV-2008-1697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "USN-747-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "name": "29412", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29412" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064", "refsource": "MISC", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1036", "datePublished": "2008-06-02T14:00:00", "dateReserved": "2008-02-26T00:00:00", "dateUpdated": "2024-08-07T08:08:57.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-1036\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-06-02T21:30:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.\"},{\"lang\":\"es\",\"value\":\"La biblioteca International Components for Unicode (ICU) en Apple Mac OS X versiones anteriores a 10.5.3, Red Hat Enterprise Linux versi\u00f3n 5 y otros sistemas operativos, omite algunas secuencias de caracteres no v\u00e1lidas durante la conversi\u00f3n de algunas codificaciones de caracteres, lo que podr\u00eda permitir a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2442D35-7484-43D8-9077-3FDF63104816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09D5933-A7D9-4A61-B863-CD8E7D5E67D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E8648C-5469-4280-A581-D4A9A41B7213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E8D614-E1EE-42F1-9E55-EA54FB500621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73BED9E-29FB-4965-B38F-013FFE5A9170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30430\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34290\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34777\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1020139\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1762\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0296.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/29412\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/29488\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-747-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-150A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1697\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42717\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008//May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/30430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34290\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/34777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1020139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29412\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-747-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-150A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42717\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
RHSA-2009:0296
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated icu packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The International Components for Unicode (ICU) library provides robust and\nfull-featured Unicode services.\n\nA flaw was found in the way ICU processed certain, invalid, encoded data.\nIf an application used ICU to decode malformed, multibyte, character data,\nit may have been possible to bypass certain content protection mechanisms,\nor display information in a manner misleading to the user. (CVE-2008-1036)\n\nAll users of icu should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0296", "url": "https://access.redhat.com/errata/RHSA-2009:0296" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0296.json" } ], "title": "Red Hat Security Advisory: icu security update", "tracking": { "current_release_date": "2025-10-09T13:07:03+00:00", "generator": { "date": "2025-10-09T13:07:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2009:0296", "initial_release_date": "2009-03-12T14:13:00+00:00", "revision_history": [ { "date": "2009-03-12T14:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-12T10:13:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T13:07:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.src", "product": { "name": "icu-0:3.6-5.11.2.src", "product_id": "icu-0:3.6-5.11.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product_id": "libicu-devel-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_id": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.x86_64", "product": { "name": "icu-0:3.6-5.11.2.x86_64", "product_id": "icu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product_id": "libicu-doc-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-0:3.6-5.11.2.x86_64", "product_id": "libicu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.i386", "product": { "name": "libicu-devel-0:3.6-5.11.2.i386", "product_id": "libicu-devel-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product_id": "icu-debuginfo-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.i386", "product": { "name": "libicu-0:3.6-5.11.2.i386", "product_id": "libicu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.i386", "product": { "name": "icu-0:3.6-5.11.2.i386", "product_id": "icu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.i386", "product": { "name": "libicu-doc-0:3.6-5.11.2.i386", "product_id": "libicu-doc-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ia64", "product": { "name": "icu-0:3.6-5.11.2.ia64", "product_id": "icu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ia64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ia64", "product_id": "libicu-devel-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ia64", "product": { "name": "libicu-doc-0:3.6-5.11.2.ia64", "product_id": "libicu-doc-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ia64", "product": { "name": "libicu-0:3.6-5.11.2.ia64", "product_id": "libicu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ppc", "product": { "name": "icu-0:3.6-5.11.2.ppc", "product_id": "icu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc", "product_id": "libicu-devel-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ppc", "product": { "name": "libicu-doc-0:3.6-5.11.2.ppc", "product_id": "libicu-doc-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc", "product": { "name": "libicu-0:3.6-5.11.2.ppc", "product_id": "libicu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product_id": "libicu-devel-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-0:3.6-5.11.2.ppc64", "product_id": "libicu-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.s390x", "product": { "name": "icu-0:3.6-5.11.2.s390x", "product_id": "icu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390x", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390x", "product_id": "libicu-devel-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.s390x", "product": { "name": "libicu-doc-0:3.6-5.11.2.s390x", "product_id": "libicu-doc-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390x", "product": { "name": "libicu-0:3.6-5.11.2.s390x", "product_id": "libicu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390", "product_id": "libicu-devel-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390", "product": { "name": "libicu-0:3.6-5.11.2.s390", "product_id": "libicu-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-1036", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "464168" } ], "notes": [ { "category": "description", "text": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1036" }, { "category": "external", "summary": "RHBZ#464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1036", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1036" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036" } ], "release_date": "2008-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-12T14:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0296" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)" } ] }
rhsa-2009_0296
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated icu packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The International Components for Unicode (ICU) library provides robust and\nfull-featured Unicode services.\n\nA flaw was found in the way ICU processed certain, invalid, encoded data.\nIf an application used ICU to decode malformed, multibyte, character data,\nit may have been possible to bypass certain content protection mechanisms,\nor display information in a manner misleading to the user. (CVE-2008-1036)\n\nAll users of icu should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0296", "url": "https://access.redhat.com/errata/RHSA-2009:0296" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0296.json" } ], "title": "Red Hat Security Advisory: icu security update", "tracking": { "current_release_date": "2024-11-22T02:30:52+00:00", "generator": { "date": "2024-11-22T02:30:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:0296", "initial_release_date": "2009-03-12T14:13:00+00:00", "revision_history": [ { "date": "2009-03-12T14:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-12T10:13:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:30:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.src", "product": { "name": "icu-0:3.6-5.11.2.src", "product_id": "icu-0:3.6-5.11.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product_id": "libicu-devel-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_id": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.x86_64", "product": { "name": "icu-0:3.6-5.11.2.x86_64", "product_id": "icu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product_id": "libicu-doc-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-0:3.6-5.11.2.x86_64", "product_id": "libicu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.i386", "product": { "name": "libicu-devel-0:3.6-5.11.2.i386", "product_id": "libicu-devel-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product_id": "icu-debuginfo-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.i386", "product": { "name": "libicu-0:3.6-5.11.2.i386", "product_id": "libicu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.i386", "product": { "name": "icu-0:3.6-5.11.2.i386", "product_id": "icu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.i386", "product": { "name": "libicu-doc-0:3.6-5.11.2.i386", "product_id": "libicu-doc-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ia64", "product": { "name": "icu-0:3.6-5.11.2.ia64", "product_id": "icu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ia64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ia64", "product_id": "libicu-devel-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ia64", "product": { "name": "libicu-doc-0:3.6-5.11.2.ia64", "product_id": "libicu-doc-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ia64", "product": { "name": "libicu-0:3.6-5.11.2.ia64", "product_id": "libicu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ppc", "product": { "name": "icu-0:3.6-5.11.2.ppc", "product_id": "icu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc", "product_id": "libicu-devel-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ppc", "product": { "name": "libicu-doc-0:3.6-5.11.2.ppc", "product_id": "libicu-doc-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc", "product": { "name": "libicu-0:3.6-5.11.2.ppc", "product_id": "libicu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product_id": "libicu-devel-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-0:3.6-5.11.2.ppc64", "product_id": "libicu-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.s390x", "product": { "name": "icu-0:3.6-5.11.2.s390x", "product_id": "icu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390x", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390x", "product_id": "libicu-devel-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.s390x", "product": { "name": "libicu-doc-0:3.6-5.11.2.s390x", "product_id": "libicu-doc-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390x", "product": { "name": "libicu-0:3.6-5.11.2.s390x", "product_id": "libicu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390", "product_id": "libicu-devel-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390", "product": { "name": "libicu-0:3.6-5.11.2.s390", "product_id": "libicu-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-1036", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "464168" } ], "notes": [ { "category": "description", "text": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1036" }, { "category": "external", "summary": "RHBZ#464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1036", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1036" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036" } ], "release_date": "2008-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-12T14:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0296" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)" } ] }
rhsa-2009:0296
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated icu packages that fix a security issue are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The International Components for Unicode (ICU) library provides robust and\nfull-featured Unicode services.\n\nA flaw was found in the way ICU processed certain, invalid, encoded data.\nIf an application used ICU to decode malformed, multibyte, character data,\nit may have been possible to bypass certain content protection mechanisms,\nor display information in a manner misleading to the user. (CVE-2008-1036)\n\nAll users of icu should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:0296", "url": "https://access.redhat.com/errata/RHSA-2009:0296" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0296.json" } ], "title": "Red Hat Security Advisory: icu security update", "tracking": { "current_release_date": "2025-10-09T13:07:03+00:00", "generator": { "date": "2025-10-09T13:07:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2009:0296", "initial_release_date": "2009-03-12T14:13:00+00:00", "revision_history": [ { "date": "2009-03-12T14:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-03-12T10:13:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T13:07:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.src", "product": { "name": "icu-0:3.6-5.11.2.src", "product_id": "icu-0:3.6-5.11.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-devel-0:3.6-5.11.2.x86_64", "product_id": "libicu-devel-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_id": "icu-debuginfo-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.x86_64", "product": { "name": "icu-0:3.6-5.11.2.x86_64", "product_id": "icu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-doc-0:3.6-5.11.2.x86_64", "product_id": "libicu-doc-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=x86_64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.x86_64", "product": { "name": "libicu-0:3.6-5.11.2.x86_64", "product_id": "libicu-0:3.6-5.11.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.i386", "product": { "name": "libicu-devel-0:3.6-5.11.2.i386", "product_id": "libicu-devel-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.i386", "product_id": "icu-debuginfo-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.i386", "product": { "name": "libicu-0:3.6-5.11.2.i386", "product_id": "libicu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "icu-0:3.6-5.11.2.i386", "product": { "name": "icu-0:3.6-5.11.2.i386", "product_id": "icu-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=i386" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.i386", "product": { "name": "libicu-doc-0:3.6-5.11.2.i386", "product_id": "libicu-doc-0:3.6-5.11.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ia64", "product": { "name": "icu-0:3.6-5.11.2.ia64", "product_id": "icu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ia64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ia64", "product_id": "libicu-devel-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ia64", "product": { "name": "libicu-doc-0:3.6-5.11.2.ia64", "product_id": "libicu-doc-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ia64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ia64", "product": { "name": "libicu-0:3.6-5.11.2.ia64", "product_id": "libicu-0:3.6-5.11.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.ppc", "product": { "name": "icu-0:3.6-5.11.2.ppc", "product_id": "icu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc", "product_id": "libicu-devel-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.ppc", "product": { "name": "libicu-doc-0:3.6-5.11.2.ppc", "product_id": "libicu-doc-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=ppc" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc", "product": { "name": "libicu-0:3.6-5.11.2.ppc", "product_id": "libicu-0:3.6-5.11.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-devel-0:3.6-5.11.2.ppc64", "product_id": "libicu-devel-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_id": "icu-debuginfo-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=ppc64" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.ppc64", "product": { "name": "libicu-0:3.6-5.11.2.ppc64", "product_id": "libicu-0:3.6-5.11.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "icu-0:3.6-5.11.2.s390x", "product": { "name": "icu-0:3.6-5.11.2.s390x", "product_id": "icu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390x", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390x", "product_id": "libicu-devel-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-doc-0:3.6-5.11.2.s390x", "product": { "name": "libicu-doc-0:3.6-5.11.2.s390x", "product_id": "libicu-doc-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-doc@3.6-5.11.2?arch=s390x" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390x", "product": { "name": "libicu-0:3.6-5.11.2.s390x", "product_id": "libicu-0:3.6-5.11.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libicu-devel-0:3.6-5.11.2.s390", "product": { "name": "libicu-devel-0:3.6-5.11.2.s390", "product_id": "libicu-devel-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu-devel@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product": { "name": "icu-debuginfo-0:3.6-5.11.2.s390", "product_id": "icu-debuginfo-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/icu-debuginfo@3.6-5.11.2?arch=s390" } } }, { "category": "product_version", "name": "libicu-0:3.6-5.11.2.s390", "product": { "name": "libicu-0:3.6-5.11.2.s390", "product_id": "libicu-0:3.6-5.11.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libicu@3.6-5.11.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.i386" }, "product_reference": "icu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ia64" }, "product_reference": "icu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.ppc" }, "product_reference": "icu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.s390x" }, "product_reference": "icu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.src" }, "product_reference": "icu-0:3.6-5.11.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.i386" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ia64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.s390x" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "icu-debuginfo-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64" }, "product_reference": "icu-debuginfo-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.i386" }, "product_reference": "libicu-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390" }, "product_reference": "libicu-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.i386" }, "product_reference": "libicu-devel-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.ppc64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-devel-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-devel-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-devel-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.i386" }, "product_reference": "libicu-doc-0:3.6-5.11.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ia64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.ppc" }, "product_reference": "libicu-doc-0:3.6-5.11.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.s390x" }, "product_reference": "libicu-doc-0:3.6-5.11.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-0:3.6-5.11.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:libicu-doc-0:3.6-5.11.2.x86_64" }, "product_reference": "libicu-doc-0:3.6-5.11.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-1036", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2008-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "464168" } ], "notes": [ { "category": "description", "text": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1036" }, { "category": "external", "summary": "RHBZ#464168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1036", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1036" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036" } ], "release_date": "2008-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-03-12T14:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:icu-0:3.6-5.11.2.i386", "5Client-Workstation:icu-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-0:3.6-5.11.2.src", "5Client-Workstation:icu-0:3.6-5.11.2.x86_64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.i386", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client-Workstation:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.ppc64", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-devel-0:3.6-5.11.2.x86_64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.i386", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ia64", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.ppc", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.s390x", "5Client-Workstation:libicu-doc-0:3.6-5.11.2.x86_64", "5Client:icu-0:3.6-5.11.2.i386", "5Client:icu-0:3.6-5.11.2.ia64", "5Client:icu-0:3.6-5.11.2.ppc", "5Client:icu-0:3.6-5.11.2.s390x", "5Client:icu-0:3.6-5.11.2.src", "5Client:icu-0:3.6-5.11.2.x86_64", "5Client:icu-debuginfo-0:3.6-5.11.2.i386", "5Client:icu-debuginfo-0:3.6-5.11.2.ia64", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc", "5Client:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Client:icu-debuginfo-0:3.6-5.11.2.s390", "5Client:icu-debuginfo-0:3.6-5.11.2.s390x", "5Client:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Client:libicu-0:3.6-5.11.2.i386", "5Client:libicu-0:3.6-5.11.2.ia64", "5Client:libicu-0:3.6-5.11.2.ppc", "5Client:libicu-0:3.6-5.11.2.ppc64", "5Client:libicu-0:3.6-5.11.2.s390", "5Client:libicu-0:3.6-5.11.2.s390x", "5Client:libicu-0:3.6-5.11.2.x86_64", "5Client:libicu-devel-0:3.6-5.11.2.i386", "5Client:libicu-devel-0:3.6-5.11.2.ia64", "5Client:libicu-devel-0:3.6-5.11.2.ppc", "5Client:libicu-devel-0:3.6-5.11.2.ppc64", "5Client:libicu-devel-0:3.6-5.11.2.s390", "5Client:libicu-devel-0:3.6-5.11.2.s390x", "5Client:libicu-devel-0:3.6-5.11.2.x86_64", "5Client:libicu-doc-0:3.6-5.11.2.i386", "5Client:libicu-doc-0:3.6-5.11.2.ia64", "5Client:libicu-doc-0:3.6-5.11.2.ppc", "5Client:libicu-doc-0:3.6-5.11.2.s390x", "5Client:libicu-doc-0:3.6-5.11.2.x86_64", "5Server:icu-0:3.6-5.11.2.i386", "5Server:icu-0:3.6-5.11.2.ia64", "5Server:icu-0:3.6-5.11.2.ppc", "5Server:icu-0:3.6-5.11.2.s390x", "5Server:icu-0:3.6-5.11.2.src", "5Server:icu-0:3.6-5.11.2.x86_64", "5Server:icu-debuginfo-0:3.6-5.11.2.i386", "5Server:icu-debuginfo-0:3.6-5.11.2.ia64", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc", "5Server:icu-debuginfo-0:3.6-5.11.2.ppc64", "5Server:icu-debuginfo-0:3.6-5.11.2.s390", "5Server:icu-debuginfo-0:3.6-5.11.2.s390x", "5Server:icu-debuginfo-0:3.6-5.11.2.x86_64", "5Server:libicu-0:3.6-5.11.2.i386", "5Server:libicu-0:3.6-5.11.2.ia64", "5Server:libicu-0:3.6-5.11.2.ppc", "5Server:libicu-0:3.6-5.11.2.ppc64", "5Server:libicu-0:3.6-5.11.2.s390", "5Server:libicu-0:3.6-5.11.2.s390x", "5Server:libicu-0:3.6-5.11.2.x86_64", "5Server:libicu-devel-0:3.6-5.11.2.i386", "5Server:libicu-devel-0:3.6-5.11.2.ia64", "5Server:libicu-devel-0:3.6-5.11.2.ppc", "5Server:libicu-devel-0:3.6-5.11.2.ppc64", "5Server:libicu-devel-0:3.6-5.11.2.s390", "5Server:libicu-devel-0:3.6-5.11.2.s390x", "5Server:libicu-devel-0:3.6-5.11.2.x86_64", "5Server:libicu-doc-0:3.6-5.11.2.i386", "5Server:libicu-doc-0:3.6-5.11.2.ia64", "5Server:libicu-doc-0:3.6-5.11.2.ppc", "5Server:libicu-doc-0:3.6-5.11.2.s390x", "5Server:libicu-doc-0:3.6-5.11.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:0296" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)" } ] }
ghsa-w398-xcxp-rxmr
Vulnerability from github
The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
{ "affected": [], "aliases": [ "CVE-2008-1036" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-06-02T21:30:00Z", "severity": "MODERATE" }, "details": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GHSA-w398-xcxp-rxmr", "modified": "2022-05-01T23:36:01Z", "published": "2022-05-01T23:36:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/30430" }, { "type": "WEB", "url": "http://secunia.com/advisories/34290" }, { "type": "WEB", "url": "http://secunia.com/advisories/34777" }, { "type": "WEB", "url": "http://securitytracker.com/id?1020139" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1762" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/29412" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/29488" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1697" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2008-1036
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-1036", "description": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GSD-2008-1036", "references": [ "https://www.suse.com/security/cve/CVE-2008-1036.html", "https://www.debian.org/security/2009/dsa-1762", "https://access.redhat.com/errata/RHSA-2009:0296", "https://linux.oracle.com/cve/CVE-2008-1036.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-1036" ], "details": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "id": "GSD-2008-1036", "modified": "2023-12-13T01:23:02.894565Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2009:0296", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "name": "macosx-icu-security-bypass(42717)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "name": "34777", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34777" }, { "name": "29488", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29488" }, { "name": "1020139", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020139" }, { "name": "TA08-150A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "30430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30430" }, { "name": "APPLE-SA-2008-05-28", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "DSA-1762", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1762" }, { "name": "34290", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34290" }, { "name": "oval:org.mitre.oval:def:10824", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "name": "ADV-2008-1697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "USN-747-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "name": "29412", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29412" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064", "refsource": "MISC", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1036" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2008-05-28", "refsource": "APPLE", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name": "TA08-150A", "refsource": "CERT", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name": "29412", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/29412" }, { "name": "1020139", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1020139" }, { "name": "30430", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30430" }, { "name": "29488", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/29488" }, { "name": "RHSA-2009:0296", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "name": "34290", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34290" }, { "name": "USN-747-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "name": "DSA-1762", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2009/dsa-1762" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064", "refsource": "MISC", "tags": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" }, { "name": "34777", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34777" }, { "name": "ADV-2008-1697", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "name": "macosx-icu-security-bypass(42717)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "name": "oval:org.mitre.oval:def:10824", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2017-09-29T01:30Z", "publishedDate": "2008-06-02T21:30Z" } } }
var-200805-0566
Vulnerability from variot
The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks. The security update addresses a total of 19 new vulnerabilities that affect the AFP Server, AppKit, Apple Pixlet Video, ATS, CFNetwork, CoreFoundation, CoreGraphics, CoreTypes, CUPS, Help Viewer, iCal, International Components for Unicode, Image Capture, ImageIO, Kernel, Mail, Single Sign-On, and Wiki Server components of Mac OS X. The International Components for Unicode (ICU) is prone to a vulnerability related to the handling of certain invalid character sequences. An attacker may leverage this vulnerability to bypass content filters. This may lead to cross-site scripting attacks or the disclosure of sensitive information in some cases. Other attacks are also possible. NOTE: This issue was previously covered in BID 29412 (Apple Mac OS X 2008-003 Multiple Security Vulnerabilities), but has been given its own record to better document the vulnerability.
I. Further details are available in the US-CERT Vulnerability Notes Database.
II.
III. These and other updates are available via Software Update or via Apple Downloads.
IV. Please send email to cert@cert.org with "TA08-150A Feedback VU#566875" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2008 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
May 29 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBSD8M8XIHljM+H4irAQL8gggAhPXOm6pPXxrZpjiJYHmlhwCCIclyj9vo Yvs/cicI8vJ3vB4xkUd51/iFoze6D3mFnSxwVAgrixysdkaCxBUyWqmRumEDTXfx 403FR2yIFpSFr7+9VXXWpmq6E0aHVjrKPOArq5uysuIPOHiEbKUisT2gBXUlPrtN RjUg/w/9/IEryPxv/nVzHMcLDde2OLyoo+tiSCOqJK/sC/VUM/d1zkdIDOfu0zom vmqM10hDyA7VR2rgkKvSbqXOWHua0t4eHaNMP0h3N51yLmFhMHxBGj9zWXj9dpHI DcQ9gnQKm7YocOfLC4IPV0BWuPoAkNOEAPeRapPgmJ60icjOpn/MTQ== =QvSr -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
The Public Beta has ended. Thanks to all that participated.
1) An error in AFP server allows connected users or guests to access files and directories that are not within a shared directory.
2) Some vulnerabilities in Apache can be exploited by malicious people to conduct cross-site scripting attacks or to cause a DoS (Denial of Service).
3) An unspecified error in AppKit can potentially be exploited to execute arbitrary code when a user opens a specially crafted document file with an editor that uses AppKit (e.g. TextEdit).
4) Multiple unspecified errors exist in the processing of Pixlet video files. These can be exploited to cause memory corruption and potentially allow for execution of arbitrary code when a user opens a specially crafted movie file.
5) An unspecified error exists in Apple Type Services when processing embedded fonts in PDF files. This can be exploited to cause a memory corruption when a PDF file containing a specially crafted embedded font is printed.
Successful exploitation may allow execution of arbitrary code.
6) An error in Safari's SSL client certificate handling can lead to an information disclosure of the first client certificate found in the keychain when a web server issues a client certificate request.
7) An integer overflow exists in CoreFoundation when handling CFData objects. This can be exploited to cause a heap-based buffer overflow if an application calls "CFDataReplaceBytes" with an invalid "length" argument.
8) An error due to an uninitialised variable in CoreGraphics can potentially be exploited to execute arbitrary code when a specially crafted PDF is opened.
9) A weakness is caused due to users not being warned before opening certain potentially unsafe content types.
11) Some vulnerabilities in Adobe Flash Player can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or to potentially compromise a user's system.
For more information: SA28083
12) An integer underflow error in Help Viewer when handling help:topic URLs can be exploited to cause a buffer overflow when a specially crafted help:topic URL is accessed.
Successful exploitation may allow execution of arbitrary code.
14) Input passed to unspecified parameters in Image Capture's embedded web server is not properly sanitised before being used. This can be exploited to disclose the content of local files via directory traversal attacks.
15) An error in the handling of temporary files in Image Capture can be exploited by malicious, local users to manipulate files with the privilege of a user running Image Capture.
16) A boundary error in the BMP and GIF image decoding engine in ImageIO can be exploited to disclose content in memory.
17) Some vulnerabilities in ImageIO can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerabilities are caused due to the use of vulnerable libpng code.
For more information: SA27093 SA27130
18) An integer overflow error in ImageIO within the processing of JPEG2000 images can be exploited to cause a heap-based buffer overflow when a specially crafted JPEG2000 image is viewed.
Successful exploitation of this vulnerability may allow execution of arbitrary code.
19) An error in Mail is caused due to an uninitialised variable and can lead to disclosure of sensitive information and potentially execution of arbitrary code when mail is sent through an SMTP server over IPv6.
For more information: SA28323
21) The sso_util command-line tool requires that passwords be passed to it in its arguments, which can be exploited by malicious, local users to disclose the passwords.
22) An error in Wiki Server can be exploited to determine valid local user names when nonexistent blogs are accessed.
ORIGINAL ADVISORY: http://support.apple.com/kb/HT1897
OTHER REFERENCES: SA18008: http://secunia.com/advisories/18008/
SA18307: http://secunia.com/advisories/18307/
SA26273: http://secunia.com/advisories/26273/
SA26636: http://secunia.com/advisories/26636/
SA27093: http://secunia.com/advisories/27093/
SA27130: http://secunia.com/advisories/27130/
SA28081: http://secunia.com/advisories/28081/
SA28083: http://secunia.com/advisories/28083/
SA28323: http://secunia.com/advisories/28323/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. =========================================================== Ubuntu Security Notice USN-747-1 March 26, 2009 icu vulnerability CVE-2008-1036 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libicu34 3.4.1a-1ubuntu1.6.06.2
Ubuntu 7.10: libicu36 3.6-3ubuntu0.2
Ubuntu 8.04 LTS: libicu38 3.8-6ubuntu0.1
Ubuntu 8.10: libicu38 3.8.1-2ubuntu0.1
After a standard system upgrade you need to restart applications linked against libicu, such as OpenOffice.org, to effect the necessary changes.
Details follow:
It was discovered that libicu did not correctly handle certain invalid encoded data. If a user or automated system were tricked into processing specially crafted data with applications linked against libicu, certain content filters could be bypassed. ----------------------------------------------------------------------
Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list?
Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/
Click here to trial our solutions: http://secunia.com/advisories/try_vi/
TITLE: Red Hat update for icu
SECUNIA ADVISORY ID: SA34290
VERIFY ADVISORY: http://secunia.com/advisories/34290/
DESCRIPTION: Red Hat has issued an update for icu.
For more information: SA34246
SOLUTION: Updated packages are available via Red Hat Network. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1762-1 security@debian.org http://www.debian.org/security/ Steffen Joeris April 02, 2009 http://www.debian.org/security/faq
Package : icu Vulnerability : insufficient input sanitising Problem type : remote Debian-specific: no CVE Id : CVE-2008-1036
It was discovered that icu, the internal components for Unicode, did not properly sanitise invalid encoded data, which could lead to cross- site scripting attacks.
For the stable distribution (lenny), this problem has been fixed in version 3.8.1-3+lenny1.
For the oldstable distribution (etch), this problem has been fixed in version 3.6-2etch2.
For the testing distribution (squeeze) and the unstable distribution (sid), this problem has been fixed in version 4.0.1-1.
We recommend that you upgrade your icu packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Debian (oldstable)
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.diff.gz Size/MD5 checksum: 14912 d15e89ba186f4003cf0fe25523bf5b68 http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.dsc Size/MD5 checksum: 600 be64e9d5a346866e9cb5c0f60243d2fe http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz Size/MD5 checksum: 9778863 0f1bda1992b4adca62da68a7ad79d830
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch2_all.deb Size/MD5 checksum: 3334030 c6e6fbd348c8d802746a890393a767a5
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_alpha.deb Size/MD5 checksum: 5584350 c988d1810f2abe6aca3c530061343674 http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_alpha.deb Size/MD5 checksum: 7009562 489c1341f1331b8664ec201d7b0896ac
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_amd64.deb Size/MD5 checksum: 5444828 4cf4fecae90466c879a1b506da4b54da http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_amd64.deb Size/MD5 checksum: 6584058 b74be6476a73b13f397c742dd05a46ef
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_arm.deb Size/MD5 checksum: 5455872 ffd9a4362bd56c95ac8c9e2d59b0f85b http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_arm.deb Size/MD5 checksum: 6625136 a64d8a5965f960b7a42f175465552d1b
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_i386.deb Size/MD5 checksum: 6480730 bab51b594e5b159ec97c4d0a78e137d4 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_i386.deb Size/MD5 checksum: 5464844 6022ce1a314dc2ac9ba6a4e7c2364c0f
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_ia64.deb Size/MD5 checksum: 7240032 54c98bff14b4d4b9106cbe4a0f37a790 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_ia64.deb Size/MD5 checksum: 5865936 dfe2b9a21d02b3f6d0328076e90884b9
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mips.deb Size/MD5 checksum: 5747772 6f7e94aa52df7e55632aded82da5be5b http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mips.deb Size/MD5 checksum: 7032276 c873f62a11e599880d349171be6724b7
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mipsel.deb Size/MD5 checksum: 6767430 c34cfe617b2fa3b0ac265f445a77b151 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mipsel.deb Size/MD5 checksum: 5462642 42cec53922ec7b565c314daca3480331
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_powerpc.deb Size/MD5 checksum: 6889534 dbbcea68da2b4cde02734cf8af6a8bdd http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_powerpc.deb Size/MD5 checksum: 5748424 4af92234d22b585cdce7912733bc309e
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_s390.deb Size/MD5 checksum: 6895200 637a01ea921657380bd42959e4bd5adf http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_s390.deb Size/MD5 checksum: 5777440 b1be81050b86652f9c1d943bc4887dc7
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_sparc.deb Size/MD5 checksum: 6772296 b0bb6f8d327193d0e9055e8eb8f98a51 http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_sparc.deb Size/MD5 checksum: 5671528 fa33dfa1c2278405708d23cd94be6919
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.dsc Size/MD5 checksum: 1297 daaf6d8629a5cde19dcfed98bc9a84a9 http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz Size/MD5 checksum: 10591204 ca52a1eb5050478f5f7d24e16ce01f57 http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.diff.gz Size/MD5 checksum: 20267 9c9d1d71c50f4deec44e95a9d5ea2530
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny1_all.deb Size/MD5 checksum: 3774790 1a1cd3c7fde641350322461af9f57a37
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_alpha.deb Size/MD5 checksum: 7565948 02e495e8771842e904cf67a80de61b82 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_alpha.deb Size/MD5 checksum: 6065532 de58265aad775defadbb2a7b6af9d88d http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_alpha.deb Size/MD5 checksum: 2364976 a28a051462a4b40c1ca94b663145ce16
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny1_amd64.deb Size/MD5 checksum: 6062920 3a90fc0d97f43436e4cca417a662b0f8 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_amd64.deb Size/MD5 checksum: 7131010 c7bcc67bf7ebc77254f2b5b9f312f1bb http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_amd64.deb Size/MD5 checksum: 2401370 d54929d018b9c28224299bad4b3fd3a7 http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny1_amd64.deb Size/MD5 checksum: 5920040 bfbb1dd39f462c2737a114f40fc3b494 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_amd64.deb Size/MD5 checksum: 5932356 bcf6d7dab8a71f00e702384b97cf19a4
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_arm.deb Size/MD5 checksum: 2286786 ce4bb8567f48cc3cf235368db8963544 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_arm.deb Size/MD5 checksum: 7183924 fbc8204644ef5e0fc74fc22f7d26034a http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_arm.deb Size/MD5 checksum: 5907872 93989d0a25c86c9e38e6317ca420fbc4
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_armel.deb Size/MD5 checksum: 1755700 89f87c26a0ce9a7f923a05d9b2555673 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_armel.deb Size/MD5 checksum: 7411842 70fc597eeb9c0e9e68d0137e0216f124 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_armel.deb Size/MD5 checksum: 5847710 08c26011ddb182edb57549e671d6cc61
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_hppa.deb Size/MD5 checksum: 6377564 b8b8b1a62a0a02dd8469f7c172d92415 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_hppa.deb Size/MD5 checksum: 7663982 cae24c749162aa3f4a896ec5dbde678a http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_hppa.deb Size/MD5 checksum: 2357154 3ba097e27ead38178bbb8f804f13d77a
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_i386.deb Size/MD5 checksum: 2278828 f9111677c4e7b9244bd643d748e2f18c http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_i386.deb Size/MD5 checksum: 5920016 7aecb5bc8fe15f0c1b5ef5c4419eab6a http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_i386.deb Size/MD5 checksum: 6991888 351e9f8d60f139c335bf7ea07235dc08
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_ia64.deb Size/MD5 checksum: 6396240 7c56b1d5f54c9f6a4a2a6fc9698e4337 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_ia64.deb Size/MD5 checksum: 7825392 c99733de07fe43de5c0c1d923ebf93aa http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_ia64.deb Size/MD5 checksum: 2207992 757e5e5c49c66411cc7e1077808c7576
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mips.deb Size/MD5 checksum: 7599142 1d81608602f7b3a18dc8e3d03bf603ff http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mips.deb Size/MD5 checksum: 6207630 d7bd482f6030f1ae4ff75c4735947b08 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mips.deb Size/MD5 checksum: 2472538 2f7b6f0c8a5dfa6ce877b8305a6779b0
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mipsel.deb Size/MD5 checksum: 2405182 59d89f0a9a81429ec02f87debcb8e6a3 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mipsel.deb Size/MD5 checksum: 5898892 94257031e244b5b52e9cbe8e37bb1f30 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mipsel.deb Size/MD5 checksum: 7293408 f70b0c75989a5983f6921ee323b99c3c
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_powerpc.deb Size/MD5 checksum: 6290800 bae34e705b5213d14a638350398a7d29 http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_powerpc.deb Size/MD5 checksum: 7460598 8edd0cb02d62dfc5ce69c872e413ca39 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_powerpc.deb Size/MD5 checksum: 2376240 00fc0ad10f85fded7380fcaaccbe1514
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_s390.deb Size/MD5 checksum: 7434356 de117fb929327d908c11ede36daa9166 http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_s390.deb Size/MD5 checksum: 6269494 a17ae098f688e8a14bc79854013cada4 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_s390.deb Size/MD5 checksum: 2468406 d57fdf831571e1147f213051a50f8fdd
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_sparc.deb Size/MD5 checksum: 6144646 e12966bb72793d7e6220eafd5ddb0c88 http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_sparc.deb Size/MD5 checksum: 2133070 454335db0966dc15c78261ef1a8fdcfc http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_sparc.deb Size/MD5 checksum: 7302732 432d9fdee1502bf363d1db33ee6519ab
These files will probably be moved into the stable distribution on its next update
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200805-0566", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux", "scope": "eq", "trust": 1.6, "vendor": "redhat", "version": "5" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "v10.5.3" }, { "model": "mac os x server", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "v10.5.3" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5" }, { "model": "mac os server", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "x10.5.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20080" }, { "model": "project international components for unicode", "scope": "eq", "trust": 0.3, "vendor": "icu", "version": "3.8.1" }, { "model": "project international components for unicode", "scope": "eq", "trust": 0.3, "vendor": "icu", "version": "3.8" }, { "model": "project international components for unicode", "scope": "eq", "trust": 0.3, "vendor": "icu", "version": "3.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "project international components for unicode", "scope": "ne", "trust": 0.3, "vendor": "icu", "version": "4.0" } ], "sources": [ { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "CNNVD", "id": "CNNVD-200806-008" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001406" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Melissa O\u0027NeillPaul HaddadRodrigo CarvalhoGynvael Coldwind", "sources": [ { "db": "CNNVD", "id": "CNNVD-200806-008" } ], "trust": 0.6 }, "cve": "CVE-2008-1036", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2008-1036", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-31161", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-1036", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-1036", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200806-008", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-31161", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-31161" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "CNNVD", "id": "CNNVD-200806-008" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks. \nThe security update addresses a total of 19 new vulnerabilities that affect the AFP Server, AppKit, Apple Pixlet Video, ATS, CFNetwork, CoreFoundation, CoreGraphics, CoreTypes, CUPS, Help Viewer, iCal, International Components for Unicode, Image Capture, ImageIO, Kernel, Mail, Single Sign-On, and Wiki Server components of Mac OS X. The International Components for Unicode (ICU) is prone to a vulnerability related to the handling of certain invalid character sequences. \nAn attacker may leverage this vulnerability to bypass content filters. This may lead to cross-site scripting attacks or the disclosure of sensitive information in some cases. Other attacks are also possible. \nNOTE: This issue was previously covered in BID 29412 (Apple Mac OS X 2008-003 Multiple Security Vulnerabilities), but has been given its own record to better document the vulnerability. \n\nI. Further\n details are available in the US-CERT Vulnerability Notes Database. \n\nII. \n\nIII. These and other updates are available via Software Update or\n via Apple Downloads. \n\nIV. Please send\n email to \u003ccert@cert.org\u003e with \"TA08-150A Feedback VU#566875\" in the\n subject. \n _________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n _________________________________________________________________\n\n Produced 2008 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n Revision History\n\n May 29 2008: Initial release\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBSD8M8XIHljM+H4irAQL8gggAhPXOm6pPXxrZpjiJYHmlhwCCIclyj9vo\nYvs/cicI8vJ3vB4xkUd51/iFoze6D3mFnSxwVAgrixysdkaCxBUyWqmRumEDTXfx\n403FR2yIFpSFr7+9VXXWpmq6E0aHVjrKPOArq5uysuIPOHiEbKUisT2gBXUlPrtN\nRjUg/w/9/IEryPxv/nVzHMcLDde2OLyoo+tiSCOqJK/sC/VUM/d1zkdIDOfu0zom\nvmqM10hDyA7VR2rgkKvSbqXOWHua0t4eHaNMP0h3N51yLmFhMHxBGj9zWXj9dpHI\nDcQ9gnQKm7YocOfLC4IPV0BWuPoAkNOEAPeRapPgmJ60icjOpn/MTQ==\n=QvSr\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nSecunia Network Software Inspector 2.0 (NSI) - Public Beta\n\nThe Public Beta has ended. Thanks to all that participated. \n\n1) An error in AFP server allows connected users or guests to access\nfiles and directories that are not within a shared directory. \n\n2) Some vulnerabilities in Apache can be exploited by malicious\npeople to conduct cross-site scripting attacks or to cause a DoS\n(Denial of Service). \n\n3) An unspecified error in AppKit can potentially be exploited to\nexecute arbitrary code when a user opens a specially crafted document\nfile with an editor that uses AppKit (e.g. TextEdit). \n\n4) Multiple unspecified errors exist in the processing of Pixlet\nvideo files. These can be exploited to cause memory corruption and\npotentially allow for execution of arbitrary code when a user opens a\nspecially crafted movie file. \n\n5) An unspecified error exists in Apple Type Services when processing\nembedded fonts in PDF files. This can be exploited to cause a memory\ncorruption when a PDF file containing a specially crafted embedded\nfont is printed. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n6) An error in Safari\u0027s SSL client certificate handling can lead to\nan information disclosure of the first client certificate found in\nthe keychain when a web server issues a client certificate request. \n\n7) An integer overflow exists in CoreFoundation when handling CFData\nobjects. This can be exploited to cause a heap-based buffer overflow\nif an application calls \"CFDataReplaceBytes\" with an invalid \"length\"\nargument. \n\n8) An error due to an uninitialised variable in CoreGraphics can\npotentially be exploited to execute arbitrary code when a specially\ncrafted PDF is opened. \n\n9) A weakness is caused due to users not being warned before opening\ncertain potentially unsafe content types. \n\n11) Some vulnerabilities in Adobe Flash Player can be exploited by\nmalicious people to bypass certain security restrictions, conduct\ncross-site scripting attacks, or to potentially compromise a user\u0027s\nsystem. \n\nFor more information:\nSA28083\n\n12) An integer underflow error in Help Viewer when handling\nhelp:topic URLs can be exploited to cause a buffer overflow when a \nspecially crafted help:topic URL is accessed. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n14) Input passed to unspecified parameters in Image Capture\u0027s\nembedded web server is not properly sanitised before being used. This\ncan be exploited to disclose the content of local files via directory\ntraversal attacks. \n\n15) An error in the handling of temporary files in Image Capture can\nbe exploited by malicious, local users to manipulate files with the\nprivilege of a user running Image Capture. \n\n16) A boundary error in the BMP and GIF image decoding engine in\nImageIO can be exploited to disclose content in memory. \n\n17) Some vulnerabilities in ImageIO can be exploited by malicious\npeople to cause a DoS (Denial of Service). \n\nThe vulnerabilities are caused due to the use of vulnerable libpng\ncode. \n\nFor more information:\nSA27093\nSA27130\n\n18) An integer overflow error in ImageIO within the processing of\nJPEG2000 images can be exploited to cause a heap-based buffer\noverflow when a specially crafted JPEG2000 image is viewed. \n\nSuccessful exploitation of this vulnerability may allow execution of\narbitrary code. \n\n19) An error in Mail is caused due to an uninitialised variable and\ncan lead to disclosure of sensitive information and potentially\nexecution of arbitrary code when mail is sent through an SMTP server\nover IPv6. \n\nFor more information:\nSA28323\n\n21) The sso_util command-line tool requires that passwords be passed\nto it in its arguments, which can be exploited by malicious, local\nusers to disclose the passwords. \n\n22) An error in Wiki Server can be exploited to determine valid local\nuser names when nonexistent blogs are accessed. \n\nORIGINAL ADVISORY:\nhttp://support.apple.com/kb/HT1897\n\nOTHER REFERENCES:\nSA18008:\nhttp://secunia.com/advisories/18008/\n\nSA18307:\nhttp://secunia.com/advisories/18307/\n\nSA26273:\nhttp://secunia.com/advisories/26273/\n\nSA26636:\nhttp://secunia.com/advisories/26636/\n\nSA27093:\nhttp://secunia.com/advisories/27093/\n\nSA27130:\nhttp://secunia.com/advisories/27130/\n\nSA28081:\nhttp://secunia.com/advisories/28081/\n\nSA28083:\nhttp://secunia.com/advisories/28083/\n\nSA28323:\nhttp://secunia.com/advisories/28323/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. ===========================================================\nUbuntu Security Notice USN-747-1 March 26, 2009\nicu vulnerability\nCVE-2008-1036\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libicu34 3.4.1a-1ubuntu1.6.06.2\n\nUbuntu 7.10:\n libicu36 3.6-3ubuntu0.2\n\nUbuntu 8.04 LTS:\n libicu38 3.8-6ubuntu0.1\n\nUbuntu 8.10:\n libicu38 3.8.1-2ubuntu0.1\n\nAfter a standard system upgrade you need to restart applications linked\nagainst libicu, such as OpenOffice.org, to effect the necessary changes. \n\nDetails follow:\n\nIt was discovered that libicu did not correctly handle certain invalid\nencoded data. If a user or automated system were tricked into processing\nspecially crafted data with applications linked against libicu, certain\ncontent filters could be bypassed. ----------------------------------------------------------------------\n\nDid you know? Our assessment and impact rating along with detailed\ninformation such as exploit code availability, or if an updated patch\nis released by the vendor, is not part of this mailing-list?\n \nClick here to learn more about our commercial solutions:\nhttp://secunia.com/advisories/business_solutions/\n \nClick here to trial our solutions:\nhttp://secunia.com/advisories/try_vi/\n\n----------------------------------------------------------------------\n\nTITLE:\nRed Hat update for icu\n\nSECUNIA ADVISORY ID:\nSA34290\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34290/\n\nDESCRIPTION:\nRed Hat has issued an update for icu. \n\nFor more information:\nSA34246\n\nSOLUTION:\nUpdated packages are available via Red Hat Network. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1762-1 security@debian.org\nhttp://www.debian.org/security/ Steffen Joeris\nApril 02, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : icu\nVulnerability : insufficient input sanitising\nProblem type : remote\nDebian-specific: no\nCVE Id : CVE-2008-1036\n\n\nIt was discovered that icu, the internal components for Unicode, did\nnot properly sanitise invalid encoded data, which could lead to cross-\nsite scripting attacks. \n\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 3.8.1-3+lenny1. \n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 3.6-2etch2. \n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), this problem has been fixed in version 4.0.1-1. \n\n\nWe recommend that you upgrade your icu packages. \n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nDebian (oldstable)\n- ------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.diff.gz\n Size/MD5 checksum: 14912 d15e89ba186f4003cf0fe25523bf5b68\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.dsc\n Size/MD5 checksum: 600 be64e9d5a346866e9cb5c0f60243d2fe\n http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz\n Size/MD5 checksum: 9778863 0f1bda1992b4adca62da68a7ad79d830\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch2_all.deb\n Size/MD5 checksum: 3334030 c6e6fbd348c8d802746a890393a767a5\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_alpha.deb\n Size/MD5 checksum: 5584350 c988d1810f2abe6aca3c530061343674\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_alpha.deb\n Size/MD5 checksum: 7009562 489c1341f1331b8664ec201d7b0896ac\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_amd64.deb\n Size/MD5 checksum: 5444828 4cf4fecae90466c879a1b506da4b54da\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_amd64.deb\n Size/MD5 checksum: 6584058 b74be6476a73b13f397c742dd05a46ef\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_arm.deb\n Size/MD5 checksum: 5455872 ffd9a4362bd56c95ac8c9e2d59b0f85b\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_arm.deb\n Size/MD5 checksum: 6625136 a64d8a5965f960b7a42f175465552d1b\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_i386.deb\n Size/MD5 checksum: 6480730 bab51b594e5b159ec97c4d0a78e137d4\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_i386.deb\n Size/MD5 checksum: 5464844 6022ce1a314dc2ac9ba6a4e7c2364c0f\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_ia64.deb\n Size/MD5 checksum: 7240032 54c98bff14b4d4b9106cbe4a0f37a790\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_ia64.deb\n Size/MD5 checksum: 5865936 dfe2b9a21d02b3f6d0328076e90884b9\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mips.deb\n Size/MD5 checksum: 5747772 6f7e94aa52df7e55632aded82da5be5b\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mips.deb\n Size/MD5 checksum: 7032276 c873f62a11e599880d349171be6724b7\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mipsel.deb\n Size/MD5 checksum: 6767430 c34cfe617b2fa3b0ac265f445a77b151\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mipsel.deb\n Size/MD5 checksum: 5462642 42cec53922ec7b565c314daca3480331\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_powerpc.deb\n Size/MD5 checksum: 6889534 dbbcea68da2b4cde02734cf8af6a8bdd\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_powerpc.deb\n Size/MD5 checksum: 5748424 4af92234d22b585cdce7912733bc309e\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_s390.deb\n Size/MD5 checksum: 6895200 637a01ea921657380bd42959e4bd5adf\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_s390.deb\n Size/MD5 checksum: 5777440 b1be81050b86652f9c1d943bc4887dc7\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_sparc.deb\n Size/MD5 checksum: 6772296 b0bb6f8d327193d0e9055e8eb8f98a51\n http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_sparc.deb\n Size/MD5 checksum: 5671528 fa33dfa1c2278405708d23cd94be6919\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.dsc\n Size/MD5 checksum: 1297 daaf6d8629a5cde19dcfed98bc9a84a9\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz\n Size/MD5 checksum: 10591204 ca52a1eb5050478f5f7d24e16ce01f57\n http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.diff.gz\n Size/MD5 checksum: 20267 9c9d1d71c50f4deec44e95a9d5ea2530\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny1_all.deb\n Size/MD5 checksum: 3774790 1a1cd3c7fde641350322461af9f57a37\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_alpha.deb\n Size/MD5 checksum: 7565948 02e495e8771842e904cf67a80de61b82\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_alpha.deb\n Size/MD5 checksum: 6065532 de58265aad775defadbb2a7b6af9d88d\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_alpha.deb\n Size/MD5 checksum: 2364976 a28a051462a4b40c1ca94b663145ce16\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny1_amd64.deb\n Size/MD5 checksum: 6062920 3a90fc0d97f43436e4cca417a662b0f8\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_amd64.deb\n Size/MD5 checksum: 7131010 c7bcc67bf7ebc77254f2b5b9f312f1bb\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_amd64.deb\n Size/MD5 checksum: 2401370 d54929d018b9c28224299bad4b3fd3a7\n http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny1_amd64.deb\n Size/MD5 checksum: 5920040 bfbb1dd39f462c2737a114f40fc3b494\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_amd64.deb\n Size/MD5 checksum: 5932356 bcf6d7dab8a71f00e702384b97cf19a4\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_arm.deb\n Size/MD5 checksum: 2286786 ce4bb8567f48cc3cf235368db8963544\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_arm.deb\n Size/MD5 checksum: 7183924 fbc8204644ef5e0fc74fc22f7d26034a\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_arm.deb\n Size/MD5 checksum: 5907872 93989d0a25c86c9e38e6317ca420fbc4\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_armel.deb\n Size/MD5 checksum: 1755700 89f87c26a0ce9a7f923a05d9b2555673\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_armel.deb\n Size/MD5 checksum: 7411842 70fc597eeb9c0e9e68d0137e0216f124\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_armel.deb\n Size/MD5 checksum: 5847710 08c26011ddb182edb57549e671d6cc61\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_hppa.deb\n Size/MD5 checksum: 6377564 b8b8b1a62a0a02dd8469f7c172d92415\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_hppa.deb\n Size/MD5 checksum: 7663982 cae24c749162aa3f4a896ec5dbde678a\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_hppa.deb\n Size/MD5 checksum: 2357154 3ba097e27ead38178bbb8f804f13d77a\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_i386.deb\n Size/MD5 checksum: 2278828 f9111677c4e7b9244bd643d748e2f18c\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_i386.deb\n Size/MD5 checksum: 5920016 7aecb5bc8fe15f0c1b5ef5c4419eab6a\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_i386.deb\n Size/MD5 checksum: 6991888 351e9f8d60f139c335bf7ea07235dc08\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_ia64.deb\n Size/MD5 checksum: 6396240 7c56b1d5f54c9f6a4a2a6fc9698e4337\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_ia64.deb\n Size/MD5 checksum: 7825392 c99733de07fe43de5c0c1d923ebf93aa\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_ia64.deb\n Size/MD5 checksum: 2207992 757e5e5c49c66411cc7e1077808c7576\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mips.deb\n Size/MD5 checksum: 7599142 1d81608602f7b3a18dc8e3d03bf603ff\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mips.deb\n Size/MD5 checksum: 6207630 d7bd482f6030f1ae4ff75c4735947b08\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mips.deb\n Size/MD5 checksum: 2472538 2f7b6f0c8a5dfa6ce877b8305a6779b0\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mipsel.deb\n Size/MD5 checksum: 2405182 59d89f0a9a81429ec02f87debcb8e6a3\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mipsel.deb\n Size/MD5 checksum: 5898892 94257031e244b5b52e9cbe8e37bb1f30\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mipsel.deb\n Size/MD5 checksum: 7293408 f70b0c75989a5983f6921ee323b99c3c\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_powerpc.deb\n Size/MD5 checksum: 6290800 bae34e705b5213d14a638350398a7d29\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_powerpc.deb\n Size/MD5 checksum: 7460598 8edd0cb02d62dfc5ce69c872e413ca39\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_powerpc.deb\n Size/MD5 checksum: 2376240 00fc0ad10f85fded7380fcaaccbe1514\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_s390.deb\n Size/MD5 checksum: 7434356 de117fb929327d908c11ede36daa9166\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_s390.deb\n Size/MD5 checksum: 6269494 a17ae098f688e8a14bc79854013cada4\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_s390.deb\n Size/MD5 checksum: 2468406 d57fdf831571e1147f213051a50f8fdd\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_sparc.deb\n Size/MD5 checksum: 6144646 e12966bb72793d7e6220eafd5ddb0c88\n http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_sparc.deb\n Size/MD5 checksum: 2133070 454335db0966dc15c78261ef1a8fdcfc\n http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_sparc.deb\n Size/MD5 checksum: 7302732 432d9fdee1502bf363d1db33ee6519ab\n\n\n These files will probably be moved into the stable distribution on\n its next update", "sources": [ { "db": "NVD", "id": "CVE-2008-1036" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" }, { "db": "VULHUB", "id": "VHN-31161" }, { "db": "PACKETSTORM", "id": "66818" }, { "db": "PACKETSTORM", "id": "66804" }, { "db": "PACKETSTORM", "id": "76128" }, { "db": "PACKETSTORM", "id": "75728" }, { "db": "PACKETSTORM", "id": "76295" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-31161", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31161" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-1036", "trust": 3.0 }, { "db": "BID", "id": "29412", "trust": 2.8 }, { "db": "BID", "id": "29488", "trust": 2.8 }, { "db": "USCERT", "id": "TA08-150A", "trust": 2.6 }, { "db": "SECUNIA", "id": "30430", "trust": 2.6 }, { "db": "SECTRACK", "id": "1020139", "trust": 2.5 }, { "db": "SECUNIA", "id": "34290", "trust": 1.8 }, { "db": "SECUNIA", "id": "34777", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1697", "trust": 1.7 }, { "db": "XF", "id": "42717", "trust": 1.4 }, { "db": "USCERT", "id": "SA08-150A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-001406", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200806-008", "trust": 0.7 }, { "db": "UBUNTU", "id": "USN-747-1", "trust": 0.6 }, { "db": "WWW.US-CERT.GOV", "id": "TA08-150A", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2009:0296", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2008-05-28", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1762", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "76295", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "76128", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-31161", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "66818", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "66804", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "75728", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31161" }, { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "PACKETSTORM", "id": "66818" }, { "db": "PACKETSTORM", "id": "66804" }, { "db": "PACKETSTORM", "id": "76128" }, { "db": "PACKETSTORM", "id": "75728" }, { "db": "PACKETSTORM", "id": "76295" }, { "db": "CNNVD", "id": "CNNVD-200806-008" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "id": "VAR-200805-0566", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-31161" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:05:21.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Mac OS X 10.5.3", "trust": 0.8, "url": "http://support.apple.com/kb/HT1897" }, { "title": "Mac OS X 10.5.3", "trust": 0.8, "url": "http://support.apple.com/kb/HT1897?viewlocale=ja_JP" }, { "title": "icu-3.6-5.11.2", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=420" }, { "title": "RHSA-2009:0296", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2009-0296.html" }, { "title": "RHSA-2009:0296", "trust": 0.8, "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-0296J.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001406" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-31161" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/29412" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/29488" }, { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta08-150a.html" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1020139" }, { "trust": 2.5, "url": "http://secunia.com/advisories/30430" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2008//may/msg00001.html" }, { "trust": 1.7, "url": "http://www.debian.org/security/2009/dsa-1762" }, { "trust": 1.7, "url": "http://wiki.rpath.com/wiki/advisories:rpsa-2009-0064" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2009-0296.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/34290" }, { "trust": 1.7, "url": "http://secunia.com/advisories/34777" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-747-1" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2008/1697" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/42717" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10824" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1036" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta08-150a/" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta08-150a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1036" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa08-150a.html" }, { "trust": 0.6, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://bugs.icu-project.org/trac/ticket/6175" }, { "trust": 0.3, "url": "http://bugs.icu-project.org/trac/ticket/6198" }, { "trust": 0.3, "url": "http://icu-project.org/download/4.0.html" }, { "trust": 0.3, "url": "http://icu-project.org/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1036" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1338?viewlocale=en_us\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1897\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=apple_security_update_2008_003\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta08-150a.html\u003e" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26273/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosxserver1053update.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/18307/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27093/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosxserver1053comboupdate.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008003ppc.html" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1897" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosx1053update.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008003serverppc.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008003serveruniversal.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/27130/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/30430/" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector_2/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26636/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28083/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/securityupdate2008003intel.html" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/macosx1053comboupdate.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28081/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/18008/" }, { "trust": 0.1, "url": "http://secunia.com/product/96/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28323/" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34-dev_3.4.1a-1ubuntu1.6.06.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34_3.4.1a-1ubuntu1.6.06.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.4.1a-1ubuntu1.6.06.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34_3.4.1a-1ubuntu1.6.06.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.6.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.6-3ubuntu0.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36-dev_3.6-3ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36-dev_3.6-3ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8-6ubuntu0.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8-6ubuntu0.1.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8-6ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu38_3.8.1-2ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu36-dev_3.6-3ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36-dev_3.6-3ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34-dev_3.4.1a-1ubuntu1.6.06.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.4.1a.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.4.1a-1ubuntu1.6.06.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.8-6ubuntu0.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34_3.4.1a-1ubuntu1.6.06.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.6-3ubuntu0.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8-6ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu-dev_3.8-6ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36_3.6-3ubuntu0.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36_3.6-3ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu38_3.8-6ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu38_3.8-6ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34_3.4.1a-1ubuntu1.6.06.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34-dev_3.4.1a-1ubuntu1.6.06.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36-dev_3.6-3ubuntu0.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu34-dev_3.4.1a-1ubuntu1.6.06.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.6-3ubuntu0.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu36_3.6-3ubuntu0.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/lib32icu-dev_3.8.1-2ubuntu0.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu-doc_3.8.1-2ubuntu0.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8.1-2ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36_3.6-3ubuntu0.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.4.1a-1ubuntu1.6.06.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8-6ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/libicu36_3.6-3ubuntu0.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-2ubuntu0.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/i/icu/icu_3.8.1-2ubuntu0.1.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38_3.8.1-2ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu-dev_3.8.1-2ubuntu0.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/i/icu/libicu38-dbg_3.8-6ubuntu0.1_powerpc.deb" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2009-0296.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34290/" }, { "trust": 0.1, "url": "http://rhn.redhat.com" }, { "trust": 0.1, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34246/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_arm.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.8.1-3+lenny1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/lib32icu-dev_3.8.1-3+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu-doc_3.6-2etch2_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_armel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/lib32icu38_3.8.1-3+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.8.1-3+lenny1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38-dbg_3.8.1-3+lenny1_arm.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/icu_3.6-2etch2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu38_3.8.1-3+lenny1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu-dev_3.8.1-3+lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36_3.6-2etch2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/i/icu/libicu36-dev_3.6-2etch2_ia64.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-31161" }, { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "PACKETSTORM", "id": "66818" }, { "db": "PACKETSTORM", "id": "66804" }, { "db": "PACKETSTORM", "id": "76128" }, { "db": "PACKETSTORM", "id": "75728" }, { "db": "PACKETSTORM", "id": "76295" }, { "db": "CNNVD", "id": "CNNVD-200806-008" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-31161" }, { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" }, { "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "db": "PACKETSTORM", "id": "66818" }, { "db": "PACKETSTORM", "id": "66804" }, { "db": "PACKETSTORM", "id": "76128" }, { "db": "PACKETSTORM", "id": "75728" }, { "db": "PACKETSTORM", "id": "76295" }, { "db": "CNNVD", "id": "CNNVD-200806-008" }, { "db": "NVD", "id": "CVE-2008-1036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-06-02T00:00:00", "db": "VULHUB", "id": "VHN-31161" }, { "date": "2008-05-28T00:00:00", "db": "BID", "id": "29412" }, { "date": "2008-05-28T00:00:00", "db": "BID", "id": "29488" }, { "date": "2008-06-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "date": "2008-05-29T23:21:11", "db": "PACKETSTORM", "id": "66818" }, { "date": "2008-05-29T23:19:06", "db": "PACKETSTORM", "id": "66804" }, { "date": "2009-03-27T23:19:01", "db": "PACKETSTORM", "id": "76128" }, { "date": "2009-03-16T11:58:36", "db": "PACKETSTORM", "id": "75728" }, { "date": "2009-04-02T19:59:51", "db": "PACKETSTORM", "id": "76295" }, { "date": "2008-05-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-008" }, { "date": "2008-06-02T21:30:00", "db": "NVD", "id": "CVE-2008-1036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-31161" }, { "date": "2008-06-04T00:23:00", "db": "BID", "id": "29412" }, { "date": "2009-04-28T22:56:00", "db": "BID", "id": "29488" }, { "date": "2009-06-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001406" }, { "date": "2021-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200806-008" }, { "date": "2024-11-21T00:43:30.853000", "db": "NVD", "id": "CVE-2008-1036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "29412" }, { "db": "BID", "id": "29488" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac OS X of International Components for Unicode (ICU) Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001406" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "76295" }, { "db": "CNNVD", "id": "CNNVD-200806-008" } ], "trust": 0.7 } }
fkie_cve-2008-1036
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2008//May/msg00001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/30430 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34290 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34777 | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1020139 | ||
cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064 | ||
cve@mitre.org | http://www.debian.org/security/2009/dsa-1762 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-0296.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/29412 | ||
cve@mitre.org | http://www.securityfocus.com/bid/29488 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-747-1 | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA08-150A.html | Patch, US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1697 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/42717 | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008//May/msg00001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30430 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34290 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34777 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1020139 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1762 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0296.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29412 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29488 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-747-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-150A.html | Patch, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1697 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/42717 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824 |
Vendor | Product | Version | |
---|---|---|---|
apple | mac_os_x | 10.4.11 | |
apple | mac_os_x | 10.5 | |
apple | mac_os_x | 10.5.1 | |
apple | mac_os_x | 10.5.2 | |
apple | mac_os_x_server | 10.4.11 | |
apple | mac_os_x_server | 10.5 | |
apple | mac_os_x_server | 10.5.1 | |
apple | mac_os_x_server | 10.5.2 | |
redhat | enterprise_linux | 5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2442D35-7484-43D8-9077-3FDF63104816", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "matchCriteriaId": "20E8648C-5469-4280-A581-D4A9A41B7213", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "77E8D614-E1EE-42F1-9E55-EA54FB500621", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C73BED9E-29FB-4965-B38F-013FFE5A9170", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks." }, { "lang": "es", "value": "La biblioteca International Components for Unicode (ICU) en Apple Mac OS X versiones anteriores a 10.5.3, Red Hat Enterprise Linux versi\u00f3n 5 y otros sistemas operativos, omite algunas secuencias de caracteres no v\u00e1lidas durante la conversi\u00f3n de algunas codificaciones de caracteres, lo que podr\u00eda permitir a los atacantes remotos conducir ataques de tipo cross-site scripting (XSS)." } ], "id": "CVE-2008-1036", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-02T21:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30430" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34290" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34777" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1020139" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1762" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29412" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29488" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1020139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CERTA-2008-AVI-278
Vulnerability from certfr_avis
Plusieurs vulnérabilités concernant le système d'exploitation Apple Mac OS X ont été identifiées. L'exploitation de ces dernières peut avoir plusieurs conséquences, dont des exécutions de codes arbitraires à distance.
Description
Plusieurs vulnérabilités concernant le système d'exploitation Apple Mac OS X ont été identifiées :
- le serveur AFP (Apple Filing Protocol) ne vérifie pas correctement la cohérence d'accès entre répertoires et fichiers.
- le serveur Apache est mis à jour en 2.0.63 pour les versions Mac OS X Server v10.4.x ; nouvelle version qui corrige des vulnérabilités permettant des attaques par injection de code indirecte ;
- l'impression d'un document PDF spécialement construit par ATS peut provoquer l'exécution de code arbitraire ;
- l'impression de documents via CUPS à destination d'une imprimante peut permettre sous certaines conditions de récupérer des informations sensibles, y compris si une protection par mot de passe est déployée ;
- des vulnérabilités dans le module Flash Player sont corrigées (cf. CERTA-2008-AVI-197) ;
- les vulnérabilités détaillées dans l'alerte CERTA-2008-ALE-007 concernant iCal sont corrigées ;
- etc.
Solution
Se référer au bulletin de sécurité Apple pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Apple Mac 0S X versions v10.4.x.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Apple Mac OS X version v10.5.x ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s concernant le syst\u00e8me d\u0027exploitation Apple Mac\nOS X ont \u00e9t\u00e9 identifi\u00e9es :\n\n- le serveur AFP (Apple Filing Protocol) ne v\u00e9rifie pas correctement\n la coh\u00e9rence d\u0027acc\u00e8s entre r\u00e9pertoires et fichiers.\n- le serveur Apache est mis \u00e0 jour en 2.0.63 pour les versions Mac OS\n X Server v10.4.x ; nouvelle version qui corrige des vuln\u00e9rabilit\u00e9s\n permettant des attaques par injection de code indirecte ;\n- l\u0027impression d\u0027un document PDF sp\u00e9cialement construit par ATS peut\n provoquer l\u0027ex\u00e9cution de code arbitraire ;\n- l\u0027impression de documents via CUPS \u00e0 destination d\u0027une imprimante\n peut permettre sous certaines conditions de r\u00e9cup\u00e9rer des\n informations sensibles, y compris si une protection par mot de passe\n est d\u00e9ploy\u00e9e ;\n- des vuln\u00e9rabilit\u00e9s dans le module Flash Player sont corrig\u00e9es (cf.\n CERTA-2008-AVI-197) ;\n- les vuln\u00e9rabilit\u00e9s d\u00e9taill\u00e9es dans l\u0027alerte CERTA-2008-ALE-007\n concernant iCal sont corrig\u00e9es ;\n- etc.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Apple pour l\u0027obtention des correctifs\n(cf. section Documentation).\n", "cves": [ { "name": "CVE-2008-1574", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1574" }, { "name": "CVE-2008-1032", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1032" }, { "name": "CVE-2007-3847", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3847" }, { "name": "CVE-2008-1572", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1572" }, { "name": "CVE-2008-1655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1655" }, { "name": "CVE-2006-3747", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3747" }, { "name": "CVE-2007-5000", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5000" }, { "name": "CVE-2008-1575", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1575" }, { "name": "CVE-2008-1031", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1031" }, { "name": "CVE-2008-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1571" }, { "name": "CVE-2008-1027", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1027" }, { "name": "CVE-2008-1577", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1577" }, { "name": "CVE-2008-1576", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1576" }, { "name": "CVE-2008-1035", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1035" }, { "name": "CVE-2007-6612", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6612" }, { "name": "CVE-2005-3357", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3357" }, { "name": "CVE-2008-1573", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1573" }, { "name": "CVE-2008-1036", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1036" }, { "name": "CVE-2008-1028", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1028" }, { "name": "CVE-2007-5267", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5267" }, { "name": "CVE-2007-5268", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5268" }, { "name": "CVE-2008-1033", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1033" }, { "name": "CVE-2007-6019", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6019" }, { "name": "CVE-2007-5275", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5275" }, { "name": "CVE-2008-1030", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1030" }, { "name": "CVE-2008-1578", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1578" }, { "name": "CVE-2008-1034", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1034" }, { "name": "CVE-2007-5269", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5269" }, { "name": "CVE-2008-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0177" }, { "name": "CVE-2007-6243", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6243" }, { "name": "CVE-2008-1579", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1579" }, { "name": "CVE-2008-1580", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1580" }, { "name": "CVE-2007-6359", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6359" }, { "name": "CVE-2008-1654", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1654" }, { "name": "CVE-2005-3352", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3352" }, { "name": "CVE-2007-0071", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0071" }, { "name": "CVE-2007-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4465" }, { "name": "CVE-2007-6388", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6388" }, { "name": "CVE-2007-1863", "url": "https://www.cve.org/CVERecord?id=CVE-2007-1863" } ], "initial_release_date": "2008-05-29T00:00:00", "last_revision_date": "2008-05-29T00:00:00", "links": [ { "title": "Alerte CERTA-2008-ALE-007, \u00ab Multiples vuln\u00e9rabilit\u00e9s dans Apple Ical \u00bb, du 23 mai 2008 :", "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2008-ALE-007/" }, { "title": "D\u00e9tails de la mise \u00e0 jour de s\u00e9curit\u00e9 2008-003 / Mac OS X 10.5.3 :", "url": "http://support.apple.com/kb/HT1897" }, { "title": "Bulletin de s\u00e9curit\u00e9 Apple 106704 du 28 mai 2008 :", "url": "http://docs.info.apple.com/article.html?artnum=106704" }, { "title": "Tableau r\u00e9capitulatif des mises \u00e0 jour de s\u00e9curit\u00e9 pour Mac OS X :", "url": "http://support.apple.com/kb/HT1222?viewlocale=fr_FR" } ], "reference": "CERTA-2008-AVI-278", "revisions": [ { "description": "version initiale.", "revision_date": "2008-05-29T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s concernant le syst\u00e8me d\u0027exploitation Apple Mac\nOS X ont \u00e9t\u00e9 identifi\u00e9es. L\u0027exploitation de ces derni\u00e8res peut avoir\nplusieurs cons\u00e9quences, dont des ex\u00e9cutions de codes arbitraires \u00e0\ndistance.\n", "title": "Mutliples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X", "vendor_advisories": [ { "published_at": null, "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 Apple 2008-003 du 28 mai 2008", "url": null } ] }
opensuse-su-2024:10859-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "icu-69.1-2.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the icu-69.1-2.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10859", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10859-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-4770 page", "url": "https://www.suse.com/security/cve/CVE-2007-4770/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1036 page", "url": "https://www.suse.com/security/cve/CVE-2008-1036/" } ], "title": "icu-69.1-2.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10859-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "icu-69.1-2.3.aarch64", "product": { "name": "icu-69.1-2.3.aarch64", "product_id": "icu-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu-devel-69.1-2.3.aarch64", "product": { "name": "libicu-devel-69.1-2.3.aarch64", "product_id": "libicu-devel-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu-devel-32bit-69.1-2.3.aarch64", "product": { "name": "libicu-devel-32bit-69.1-2.3.aarch64", "product_id": "libicu-devel-32bit-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu-doc-69.1-2.3.aarch64", "product": { "name": "libicu-doc-69.1-2.3.aarch64", "product_id": "libicu-doc-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu69-69.1-2.3.aarch64", "product": { "name": "libicu69-69.1-2.3.aarch64", "product_id": "libicu69-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu69-32bit-69.1-2.3.aarch64", "product": { "name": "libicu69-32bit-69.1-2.3.aarch64", "product_id": "libicu69-32bit-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu69-bedata-69.1-2.3.aarch64", "product": { "name": "libicu69-bedata-69.1-2.3.aarch64", "product_id": "libicu69-bedata-69.1-2.3.aarch64" } }, { "category": "product_version", "name": "libicu69-ledata-69.1-2.3.aarch64", "product": { "name": "libicu69-ledata-69.1-2.3.aarch64", "product_id": "libicu69-ledata-69.1-2.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "icu-69.1-2.3.ppc64le", "product": { "name": "icu-69.1-2.3.ppc64le", "product_id": "icu-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu-devel-69.1-2.3.ppc64le", "product": { "name": "libicu-devel-69.1-2.3.ppc64le", "product_id": "libicu-devel-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu-devel-32bit-69.1-2.3.ppc64le", "product": { "name": "libicu-devel-32bit-69.1-2.3.ppc64le", "product_id": "libicu-devel-32bit-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu-doc-69.1-2.3.ppc64le", "product": { "name": "libicu-doc-69.1-2.3.ppc64le", "product_id": "libicu-doc-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu69-69.1-2.3.ppc64le", "product": { "name": "libicu69-69.1-2.3.ppc64le", "product_id": "libicu69-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu69-32bit-69.1-2.3.ppc64le", "product": { "name": "libicu69-32bit-69.1-2.3.ppc64le", "product_id": "libicu69-32bit-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu69-bedata-69.1-2.3.ppc64le", "product": { "name": "libicu69-bedata-69.1-2.3.ppc64le", "product_id": "libicu69-bedata-69.1-2.3.ppc64le" } }, { "category": "product_version", "name": "libicu69-ledata-69.1-2.3.ppc64le", "product": { "name": "libicu69-ledata-69.1-2.3.ppc64le", "product_id": "libicu69-ledata-69.1-2.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "icu-69.1-2.3.s390x", "product": { "name": "icu-69.1-2.3.s390x", "product_id": "icu-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu-devel-69.1-2.3.s390x", "product": { "name": "libicu-devel-69.1-2.3.s390x", "product_id": "libicu-devel-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu-devel-32bit-69.1-2.3.s390x", "product": { "name": "libicu-devel-32bit-69.1-2.3.s390x", "product_id": "libicu-devel-32bit-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu-doc-69.1-2.3.s390x", "product": { "name": "libicu-doc-69.1-2.3.s390x", "product_id": "libicu-doc-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu69-69.1-2.3.s390x", "product": { "name": "libicu69-69.1-2.3.s390x", "product_id": "libicu69-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu69-32bit-69.1-2.3.s390x", "product": { "name": "libicu69-32bit-69.1-2.3.s390x", "product_id": "libicu69-32bit-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu69-bedata-69.1-2.3.s390x", "product": { "name": "libicu69-bedata-69.1-2.3.s390x", "product_id": "libicu69-bedata-69.1-2.3.s390x" } }, { "category": "product_version", "name": "libicu69-ledata-69.1-2.3.s390x", "product": { "name": "libicu69-ledata-69.1-2.3.s390x", "product_id": "libicu69-ledata-69.1-2.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "icu-69.1-2.3.x86_64", "product": { "name": "icu-69.1-2.3.x86_64", "product_id": "icu-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu-devel-69.1-2.3.x86_64", "product": { "name": "libicu-devel-69.1-2.3.x86_64", "product_id": "libicu-devel-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu-devel-32bit-69.1-2.3.x86_64", "product": { "name": "libicu-devel-32bit-69.1-2.3.x86_64", "product_id": "libicu-devel-32bit-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu-doc-69.1-2.3.x86_64", "product": { "name": "libicu-doc-69.1-2.3.x86_64", "product_id": "libicu-doc-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu69-69.1-2.3.x86_64", "product": { "name": "libicu69-69.1-2.3.x86_64", "product_id": "libicu69-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu69-32bit-69.1-2.3.x86_64", "product": { "name": "libicu69-32bit-69.1-2.3.x86_64", "product_id": "libicu69-32bit-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu69-bedata-69.1-2.3.x86_64", "product": { "name": "libicu69-bedata-69.1-2.3.x86_64", "product_id": "libicu69-bedata-69.1-2.3.x86_64" } }, { "category": "product_version", "name": "libicu69-ledata-69.1-2.3.x86_64", "product": { "name": "libicu69-ledata-69.1-2.3.x86_64", "product_id": "libicu69-ledata-69.1-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "icu-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:icu-69.1-2.3.aarch64" }, "product_reference": "icu-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "icu-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:icu-69.1-2.3.ppc64le" }, "product_reference": "icu-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "icu-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:icu-69.1-2.3.s390x" }, "product_reference": "icu-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "icu-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:icu-69.1-2.3.x86_64" }, "product_reference": "icu-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-69.1-2.3.aarch64" }, "product_reference": "libicu-devel-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-69.1-2.3.ppc64le" }, "product_reference": "libicu-devel-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-69.1-2.3.s390x" }, "product_reference": "libicu-devel-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-69.1-2.3.x86_64" }, "product_reference": "libicu-devel-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-32bit-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.aarch64" }, "product_reference": "libicu-devel-32bit-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-32bit-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.ppc64le" }, "product_reference": "libicu-devel-32bit-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-32bit-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.s390x" }, "product_reference": "libicu-devel-32bit-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-devel-32bit-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.x86_64" }, "product_reference": "libicu-devel-32bit-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-doc-69.1-2.3.aarch64" }, "product_reference": "libicu-doc-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-doc-69.1-2.3.ppc64le" }, "product_reference": "libicu-doc-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-doc-69.1-2.3.s390x" }, "product_reference": "libicu-doc-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu-doc-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu-doc-69.1-2.3.x86_64" }, "product_reference": "libicu-doc-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-69.1-2.3.aarch64" }, "product_reference": "libicu69-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-69.1-2.3.ppc64le" }, "product_reference": "libicu69-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-69.1-2.3.s390x" }, "product_reference": "libicu69-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-69.1-2.3.x86_64" }, "product_reference": "libicu69-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-32bit-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.aarch64" }, "product_reference": "libicu69-32bit-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-32bit-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.ppc64le" }, "product_reference": "libicu69-32bit-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-32bit-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.s390x" }, "product_reference": "libicu69-32bit-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-32bit-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.x86_64" }, "product_reference": "libicu69-32bit-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-bedata-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.aarch64" }, "product_reference": "libicu69-bedata-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-bedata-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.ppc64le" }, "product_reference": "libicu69-bedata-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-bedata-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.s390x" }, "product_reference": "libicu69-bedata-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-bedata-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.x86_64" }, "product_reference": "libicu69-bedata-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-ledata-69.1-2.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.aarch64" }, "product_reference": "libicu69-ledata-69.1-2.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-ledata-69.1-2.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.ppc64le" }, "product_reference": "libicu69-ledata-69.1-2.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-ledata-69.1-2.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.s390x" }, "product_reference": "libicu69-ledata-69.1-2.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libicu69-ledata-69.1-2.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.x86_64" }, "product_reference": "libicu69-ledata-69.1-2.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-4770" } ], "notes": [ { "category": "general", "text": "libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \\0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:icu-69.1-2.3.aarch64", "openSUSE Tumbleweed:icu-69.1-2.3.ppc64le", "openSUSE Tumbleweed:icu-69.1-2.3.s390x", "openSUSE Tumbleweed:icu-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-4770", "url": "https://www.suse.com/security/cve/CVE-2007-4770" }, { "category": "external", "summary": "SUSE Bug 354372 for CVE-2007-4770", "url": "https://bugzilla.suse.com/354372" }, { "category": "external", "summary": "SUSE Bug 363252 for CVE-2007-4770", "url": "https://bugzilla.suse.com/363252" }, { "category": "external", "summary": "SUSE Bug 417817 for CVE-2007-4770", "url": "https://bugzilla.suse.com/417817" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:icu-69.1-2.3.aarch64", "openSUSE Tumbleweed:icu-69.1-2.3.ppc64le", "openSUSE Tumbleweed:icu-69.1-2.3.s390x", "openSUSE Tumbleweed:icu-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-4770" }, { "cve": "CVE-2008-1036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1036" } ], "notes": [ { "category": "general", "text": "The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:icu-69.1-2.3.aarch64", "openSUSE Tumbleweed:icu-69.1-2.3.ppc64le", "openSUSE Tumbleweed:icu-69.1-2.3.s390x", "openSUSE Tumbleweed:icu-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1036", "url": "https://www.suse.com/security/cve/CVE-2008-1036" }, { "category": "external", "summary": "SUSE Bug 489649 for CVE-2008-1036", "url": "https://bugzilla.suse.com/489649" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:icu-69.1-2.3.aarch64", "openSUSE Tumbleweed:icu-69.1-2.3.ppc64le", "openSUSE Tumbleweed:icu-69.1-2.3.s390x", "openSUSE Tumbleweed:icu-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-devel-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu-doc-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-32bit-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-bedata-69.1-2.3.x86_64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.aarch64", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.ppc64le", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.s390x", "openSUSE Tumbleweed:libicu69-ledata-69.1-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1036" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.