Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2009-4274
Vulnerability from cvelistv5
Published
2010-02-12 21:00
Modified
2024-08-07 06:54
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:54:10.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2011:1811", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076" }, { "name": "ADV-2010-0358", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0358" }, { "name": "38530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38530" }, { "name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/02/09/11" }, { "name": "ADV-2010-0780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0780" }, { "name": "netpbm-xpm-bo(56207)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "name": "SUSE-SR:2010:006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" }, { "name": "DSA-2026", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2026" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup" }, { "name": "38915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38915" }, { "name": "38164", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38164" }, { "name": "MDVSA-2010:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2011:1811", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076" }, { "name": "ADV-2010-0358", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0358" }, { "name": "38530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38530" }, { "name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/02/09/11" }, { "name": "ADV-2010-0780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0780" }, { "name": "netpbm-xpm-bo(56207)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "name": "SUSE-SR:2010:006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" }, { "name": "DSA-2026", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2026" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup" }, { "name": "38915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38915" }, { "name": "38164", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38164" }, { "name": "MDVSA-2010:039", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-4274", "datePublished": "2010-02-12T21:00:00", "dateReserved": "2009-12-10T00:00:00", "dateUpdated": "2024-08-07T06:54:10.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-4274\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-02-12T21:30:00.533\",\"lastModified\":\"2024-11-21T01:09:17.517\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en converter/ppm/xpmtoppm.c en netpbm anterior a v10.47.07, permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio(ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de imagen XPM que contiene un campo de cabecera (header) manipulado asociado con un valor alto del \u00edndice de color.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79F02C3-950F-4D47-971A-3C1367F1642C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0344253A-AF59-499B-81DF-5494A34B115F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7297482-7D30-484A-8F8D-AFEA2E468725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93BA3D19-C291-468E-9E4E-E8374AE1BD32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CF9240-FAEE-4BA2-8374-8B81F738521A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45457716-9219-4A88-A824-B45FA16643D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A0526D-918E-4FAE-90AF-2BA49F9D5276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD350ED-1327-483A-BF73-02AB9924EDED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C11849-BCD4-4982-A779-435669BD668F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C94984E9-22EE-4B24-AFCB-52137A871117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B10069-89E1-4E63-BCFF-C210CE3C5655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC42B061-EB8E-49B4-B041-42B31672C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAE142A-4F71-4452-8DAD-9D6BA11EBF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179366EE-D637-4345-8759-81D5E12EFFA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725CFC44-43C8-47FF-9935-FA006B6338FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A331F93-08C2-4F45-98AD-46DBE38A9785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFB0157-CF91-4FCB-8786-4024595B3EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92045C29-20B4-46D0-9643-491BB0642D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148A51ED-1A00-45D3-934E-96CA2759F5A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BE0692-E688-4438-98C7-FA1FCE05F41C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1904CB89-F576-4DFF-9639-9263D0ADE0B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D11F39-3B4F-43E4-AC5E-E1B5931BCBB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97023E9B-520D-4E6F-BA7F-052BA89BF2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A152B4-8483-4874-88C0-4679831BB60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBAE4A7-B0E1-4E50-8775-CAEF3E49B7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE78BA1-4001-4676-8BCB-FBC081A5D733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF606C17-AD8A-4D81-AB55-50B0C4B7763F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906047FD-1D75-4F97-977D-2A22A1DC87B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA92693-6629-4A8D-9C54-418569C852F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F078E1C6-3FB7-415B-A49A-455BE55148B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F97984A-04F4-4F69-B03B-D06FD0F21EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53FB010A-9B82-41F9-9DDB-4DCC0BFA0365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07292430-0952-4E40-9012-1DD5709D2F9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"019C4B30-4F04-4068-80B1-884F9607EC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F74038FE-C361-415B-AC47-744D3792E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6B8C20-2603-4BC6-A9C5-363E45B86492\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16998237-B53D-4E6C-B2E7-3C17BE483780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4998E602-7E72-4ED9-806F-2DF117827F24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A01D9E5-14BD-416D-8363-278FBA991BE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B55BD5-0E1C-4A13-965C-BAFBE480C384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC498C66-4E32-4E4B-9BB0-3943CB963BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4F989C-B9AF-4A0D-A39E-A9405E38229F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FCC7D4D-09B1-4063-9FE8-F88032B91FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF8AB55-8A95-47CD-960A-E9A920632B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB45C9DA-9503-4F5C-8079-0C47E778EAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1D6ABC-D56F-4484-90D0-45CD3E7B682C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48121BF-EDA1-4EAD-B24B-7BAF6668D4BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E079966-8423-4638-8A55-BC9F2412D4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE5E653-3B78-4DCE-9FE8-1126FC18D8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D339F6D7-9E9A-46C2-9823-E534F3BEBDC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A829E428-77AA-4B8F-B4E6-BB89F0054F20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6470755-BE74-49FB-B4C7-6869FB33A096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FEFA0BB-1542-4A88-BC95-A60AAEF90D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090C90E2-D688-44C2-88D7-E40F7D919FA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675512A2-6E2A-46BA-9237-114B4EA6248F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185FF47F-321E-4D26-893D-BB4F4B532670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B402DB46-6103-4428-B6BF-9263D9270EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599D4BAC-1266-4A30-A4C5-4BA13EC47F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23241E2B-21B9-4C97-B865-5C3652C27401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A40DC0-AE35-4597-8A55-D5022289435E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12B85A1-5607-4037-A362-0270EF710514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B39A1A-DC18-413E-A869-9D6C7C77BF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F62F30D-F8D9-4B47-9CFC-8F54B3F589C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B0ACB2-FE13-4145-8EAE-9D6FB7FEDD60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0253F8B8-346C-40F0-9225-4593EAF39861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2411D682-BEB2-41E0-B211-4E8EA0E551C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97036446-8A06-4AB6-842B-2186A88FBB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9F56AC-906E-4713-83ED-79A8673F59BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77A17C7-C323-4182-A099-BB3E92BF12D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DB51EA-A050-417A-8603-97BD33ACB9B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48468D84-76E9-476D-8470-3950C8281118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7472AD57-68B3-43BE-95D4-F21D39708A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA0C21F-DB95-43D9-B7B2-B076043828E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3658F6EA-E897-4A24-AD82-F3EBD4567D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F887C654-43D9-4374-88D8-DCA800B7F449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34001491-58AD-4F6C-9159-C27671EA1574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"347D3197-1915-4417-B72D-0C23BEFBAA32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0256E7B3-E119-41A4-B49D-4C08D364C22C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA3DD4D-28E0-4266-9024-A4DFF832512E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FAFCFB-0D3F-4906-ADCE-BF7F06167692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB184F25-C4ED-4655-B79D-6B00E22F9097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43FC34D4-576B-46D6-B13C-EE17C0A5AAE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0618AF8A-0927-45CC-8BF5-93B1083B8147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A715086-7459-4E99-8936-49F77323D17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979690E7-827E-4131-A3CD-235340A2FC2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD21B69B-5500-4130-9603-F46998AC7D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E222667-1825-4377-AD6E-5C88979CD5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA2DCC3-007C-4EA4-BD2B-18C776D3CBAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A9A4DD-FCE5-4585-97A5-F91120F9F2D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A8E6AAC-2DFD-4E6F-BAFA-FC002E7FBF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C739F6A-7DA4-4069-827D-B78DA08E4C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BE3C40-8066-4C41-A566-F89236D5F112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66AB52D-ECF8-4D0E-906F-7FA1AC41CD84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11B4771-81FF-4FA4-AB56-0BD51AFF10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E831F-F5FB-487F-9359-A7188C2206BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756FB7A1-2FD3-40A6-B992-5D5FF0E6A736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CEA68F-46F0-4795-9839-D961FC1A394F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A6F7C0A-FF13-4C64-B9D3-5E71FCF87813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B20DFC28-0489-404A-8783-DCA6157EACCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533419D8-A51D-4C51-A898-7E9068722FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141EBC6-830D-4ADD-8D03-DB528FF3E117\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38530\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2026\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:039\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/02/09/11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1811.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/38164\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0358\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0780\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546580\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/02/09/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1811.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/38164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4274\\n\\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\",\"lastModified\":\"2010-02-17T00:00:00\"}]}}" } }
gsd-2009-4274
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-4274", "description": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.", "id": "GSD-2009-4274", "references": [ "https://www.suse.com/security/cve/CVE-2009-4274.html", "https://www.debian.org/security/2010/dsa-2026", "https://access.redhat.com/errata/RHSA-2011:1811", "https://linux.oracle.com/cve/CVE-2009-4274.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-4274" ], "details": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.", "id": "GSD-2009-4274", "modified": "2023-12-13T01:19:45.850983Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-4274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" }, { "name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076", "refsource": "MISC", "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076" }, { "name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup", "refsource": "MISC", "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup" }, { "name": "http://secunia.com/advisories/38530", "refsource": "MISC", "url": "http://secunia.com/advisories/38530" }, { "name": "http://secunia.com/advisories/38915", "refsource": "MISC", "url": "http://secunia.com/advisories/38915" }, { "name": "http://www.debian.org/security/2010/dsa-2026", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2026" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039" }, { "name": "http://www.openwall.com/lists/oss-security/2010/02/09/11", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/02/09/11" }, { "name": "http://www.redhat.com/support/errata/RHSA-2011-1811.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html" }, { "name": "http://www.securityfocus.com/bid/38164", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/38164" }, { "name": "http://www.vupen.com/english/advisories/2010/0358", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/0358" }, { "name": "http://www.vupen.com/english/advisories/2010/0780", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/0780" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=546580", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-4274" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "38164", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/38164" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=546580", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/02/09/11" }, { "name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup", "refsource": "CONFIRM", "tags": [], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup" }, { "name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076", "refsource": "CONFIRM", "tags": [], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076" }, { "name": "ADV-2010-0358", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0358" }, { "name": "MDVSA-2010:039", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039" }, { "name": "38530", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38530" }, { "name": "38915", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/38915" }, { "name": "SUSE-SR:2010:006", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" }, { "name": "ADV-2010-0780", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/0780" }, { "name": "DSA-2026", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2010/dsa-2026" }, { "name": "RHSA-2011:1811", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html" }, { "name": "netpbm-xpm-bo(56207)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T01:18Z", "publishedDate": "2010-02-12T21:30Z" } } }
ghsa-45q7-r4qg-42p8
Vulnerability from github
Published
2022-05-02 03:53
Modified
2022-05-02 03:53
Details
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
{ "affected": [], "aliases": [ "CVE-2009-4274" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-02-12T21:30:00Z", "severity": "HIGH" }, "details": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.", "id": "GHSA-45q7-r4qg-42p8", "modified": "2022-05-02T03:53:17Z", "published": "2022-05-02T03:53:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1811" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2009-4274" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" }, { "type": "WEB", "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076" }, { "type": "WEB", "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup" }, { "type": "WEB", "url": "http://secunia.com/advisories/38530" }, { "type": "WEB", "url": "http://secunia.com/advisories/38915" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2026" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/02/09/11" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/38164" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0358" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0780" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2011_1811
Vulnerability from csaf_redhat
Published
2011-12-12 20:57
Modified
2024-11-22 04:53
Summary
Red Hat Security Advisory: netpbm security update
Notes
Topic
Updated netpbm packages that fix three security issues are now available
for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The netpbm packages contain a library of functions which support programs
for handling various graphics file formats, including .pbm (Portable Bit
Map), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable
Pixel Map), and others.
Two heap-based buffer overflow flaws were found in the embedded JasPer
library, which is used to provide support for Part 1 of the JPEG 2000 image
compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker
could create a malicious JPEG 2000 compressed image file that could cause
jpeg2ktopam to crash or, potentially, execute arbitrary code with the
privileges of the user running jpeg2ktopam. These flaws do not affect
pamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)
A stack-based buffer overflow flaw was found in the way the xpmtoppm tool
processed X PixMap (XPM) image files. An attacker could create a malicious
XPM file that would cause xpmtoppm to crash or, potentially, execute
arbitrary code with the privileges of the user running xpmtoppm.
(CVE-2009-4274)
Red Hat would like to thank Jonathan Foote of the CERT Coordination Center
for reporting the CVE-2011-4516 and CVE-2011-4517 issues.
All users of netpbm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated netpbm packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The netpbm packages contain a library of functions which support programs\nfor handling various graphics file formats, including .pbm (Portable Bit\nMap), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable\nPixel Map), and others.\n\nTwo heap-based buffer overflow flaws were found in the embedded JasPer\nlibrary, which is used to provide support for Part 1 of the JPEG 2000 image\ncompression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker\ncould create a malicious JPEG 2000 compressed image file that could cause\njpeg2ktopam to crash or, potentially, execute arbitrary code with the\nprivileges of the user running jpeg2ktopam. These flaws do not affect\npamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)\n\nA stack-based buffer overflow flaw was found in the way the xpmtoppm tool\nprocessed X PixMap (XPM) image files. An attacker could create a malicious\nXPM file that would cause xpmtoppm to crash or, potentially, execute\narbitrary code with the privileges of the user running xpmtoppm.\n(CVE-2009-4274)\n\nRed Hat would like to thank Jonathan Foote of the CERT Coordination Center\nfor reporting the CVE-2011-4516 and CVE-2011-4517 issues.\n\nAll users of netpbm are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1811", "url": "https://access.redhat.com/errata/RHSA-2011:1811" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "546580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "category": "external", "summary": "747726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1811.json" } ], "title": "Red Hat Security Advisory: netpbm security update", "tracking": { "current_release_date": "2024-11-22T04:53:14+00:00", "generator": { "date": "2024-11-22T04:53:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1811", "initial_release_date": "2011-12-12T20:57:00+00:00", "revision_history": [ { "date": "2011-12-12T20:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-12-12T21:06:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:53:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.ia64", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.ia64", "product_id": "netpbm-progs-0:10.35.58-8.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.ia64", "product": { "name": "netpbm-0:10.35.58-8.el4.ia64", "product_id": "netpbm-0:10.35.58-8.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.ia64", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.ia64", "product_id": "netpbm-devel-0:10.35.58-8.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "product": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.ia64", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.ia64", "product_id": "netpbm-0:10.35.58-8.el5_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ia64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.i386", "product": { "name": "netpbm-0:10.35.58-8.el4.i386", "product_id": "netpbm-0:10.35.58-8.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=i386" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=i386" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.i386", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.i386", "product_id": "netpbm-progs-0:10.35.58-8.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=i386" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.i386", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.i386", "product_id": "netpbm-devel-0:10.35.58-8.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=i386" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "product": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=i386" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.i386", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.i386", "product_id": "netpbm-0:10.35.58-8.el5_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=i386" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=i386" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.x86_64", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.x86_64", "product_id": "netpbm-progs-0:10.35.58-8.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.x86_64", "product": { "name": "netpbm-0:10.35.58-8.el4.x86_64", "product_id": "netpbm-0:10.35.58-8.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.x86_64", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.x86_64", "product_id": "netpbm-devel-0:10.35.58-8.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "product": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "product_id": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=x86_64" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.src", "product": { "name": "netpbm-0:10.35.58-8.el4.src", "product_id": "netpbm-0:10.35.58-8.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=src" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.src", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.src", "product_id": "netpbm-0:10.35.58-8.el5_7.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.ppc", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.ppc", "product_id": "netpbm-progs-0:10.35.58-8.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.ppc", "product": { "name": "netpbm-0:10.35.58-8.el4.ppc", "product_id": "netpbm-0:10.35.58-8.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.ppc", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.ppc", "product_id": "netpbm-devel-0:10.35.58-8.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "product": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.ppc", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc", "product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.ppc64", "product": { "name": "netpbm-0:10.35.58-8.el4.ppc64", "product_id": "netpbm-0:10.35.58-8.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc64" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc64" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc64" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.s390x", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.s390x", "product_id": "netpbm-progs-0:10.35.58-8.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.s390x", "product": { "name": "netpbm-0:10.35.58-8.el4.s390x", "product_id": "netpbm-0:10.35.58-8.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.s390x", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.s390x", "product_id": "netpbm-devel-0:10.35.58-8.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "product": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.s390x", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390x", "product_id": "netpbm-0:10.35.58-8.el5_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390x" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "netpbm-0:10.35.58-8.el4.s390", "product": { "name": "netpbm-0:10.35.58-8.el4.s390", "product_id": "netpbm-0:10.35.58-8.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390" } } }, { "category": "product_version", "name": "netpbm-progs-0:10.35.58-8.el4.s390", "product": { "name": "netpbm-progs-0:10.35.58-8.el4.s390", "product_id": "netpbm-progs-0:10.35.58-8.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el4.s390", "product": { "name": "netpbm-devel-0:10.35.58-8.el4.s390", "product_id": "netpbm-devel-0:10.35.58-8.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390" } } }, { "category": "product_version", "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "product": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390" } } }, { "category": "product_version", "name": "netpbm-0:10.35.58-8.el5_7.3.s390", "product": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390", "product_id": "netpbm-0:10.35.58-8.el5_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390" } } }, { "category": "product_version", "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "product": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.src" }, "product_reference": "netpbm-0:10.35.58-8.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.src" }, "product_reference": "netpbm-0:10.35.58-8.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.src" }, "product_reference": "netpbm-0:10.35.58-8.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.src" }, "product_reference": "netpbm-0:10.35.58-8.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.src", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Client-Workstation-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" }, "product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "relates_to_product_reference": "5Server-5.7.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-4274", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2009-12-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "546580" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.", "title": "Vulnerability description" }, { "category": "summary", "text": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4274" }, { "category": "external", "summary": "RHBZ#546580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4274", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274" } ], "release_date": "2010-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-12T20:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1811" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields" }, { "acknowledgments": [ { "names": [ "Jonathan Foote" ], "organization": "CERT Coordination Center" } ], "cve": "CVE-2011-4516", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2011-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747726" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4516" }, { "category": "external", "summary": "RHBZ#747726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516" } ], "release_date": "2011-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-12T20:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1811" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)" }, { "acknowledgments": [ { "names": [ "Jonathan Foote" ], "organization": "CERT Coordination Center" } ], "cve": "CVE-2011-4517", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2011-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747726" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4517" }, { "category": "external", "summary": "RHBZ#747726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4517", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517" } ], "release_date": "2011-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-12T20:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:1811" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:netpbm-0:10.35.58-8.el4.i386", "4AS:netpbm-0:10.35.58-8.el4.ia64", "4AS:netpbm-0:10.35.58-8.el4.ppc", "4AS:netpbm-0:10.35.58-8.el4.ppc64", "4AS:netpbm-0:10.35.58-8.el4.s390", "4AS:netpbm-0:10.35.58-8.el4.s390x", "4AS:netpbm-0:10.35.58-8.el4.src", "4AS:netpbm-0:10.35.58-8.el4.x86_64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4AS:netpbm-devel-0:10.35.58-8.el4.i386", "4AS:netpbm-devel-0:10.35.58-8.el4.ia64", "4AS:netpbm-devel-0:10.35.58-8.el4.ppc", "4AS:netpbm-devel-0:10.35.58-8.el4.s390", "4AS:netpbm-devel-0:10.35.58-8.el4.s390x", "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4AS:netpbm-progs-0:10.35.58-8.el4.i386", "4AS:netpbm-progs-0:10.35.58-8.el4.ia64", "4AS:netpbm-progs-0:10.35.58-8.el4.ppc", "4AS:netpbm-progs-0:10.35.58-8.el4.s390", "4AS:netpbm-progs-0:10.35.58-8.el4.s390x", "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-0:10.35.58-8.el4.i386", "4Desktop:netpbm-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-0:10.35.58-8.el4.s390", "4Desktop:netpbm-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-0:10.35.58-8.el4.src", "4Desktop:netpbm-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390", "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64", "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390", "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x", "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64", "4ES:netpbm-0:10.35.58-8.el4.i386", "4ES:netpbm-0:10.35.58-8.el4.ia64", "4ES:netpbm-0:10.35.58-8.el4.ppc", "4ES:netpbm-0:10.35.58-8.el4.ppc64", "4ES:netpbm-0:10.35.58-8.el4.s390", "4ES:netpbm-0:10.35.58-8.el4.s390x", "4ES:netpbm-0:10.35.58-8.el4.src", "4ES:netpbm-0:10.35.58-8.el4.x86_64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4ES:netpbm-devel-0:10.35.58-8.el4.i386", "4ES:netpbm-devel-0:10.35.58-8.el4.ia64", "4ES:netpbm-devel-0:10.35.58-8.el4.ppc", "4ES:netpbm-devel-0:10.35.58-8.el4.s390", "4ES:netpbm-devel-0:10.35.58-8.el4.s390x", "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64", "4ES:netpbm-progs-0:10.35.58-8.el4.i386", "4ES:netpbm-progs-0:10.35.58-8.el4.ia64", "4ES:netpbm-progs-0:10.35.58-8.el4.ppc", "4ES:netpbm-progs-0:10.35.58-8.el4.s390", "4ES:netpbm-progs-0:10.35.58-8.el4.s390x", "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64", "4WS:netpbm-0:10.35.58-8.el4.i386", "4WS:netpbm-0:10.35.58-8.el4.ia64", "4WS:netpbm-0:10.35.58-8.el4.ppc", "4WS:netpbm-0:10.35.58-8.el4.ppc64", "4WS:netpbm-0:10.35.58-8.el4.s390", "4WS:netpbm-0:10.35.58-8.el4.s390x", "4WS:netpbm-0:10.35.58-8.el4.src", "4WS:netpbm-0:10.35.58-8.el4.x86_64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x", "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64", "4WS:netpbm-devel-0:10.35.58-8.el4.i386", "4WS:netpbm-devel-0:10.35.58-8.el4.ia64", "4WS:netpbm-devel-0:10.35.58-8.el4.ppc", "4WS:netpbm-devel-0:10.35.58-8.el4.s390", "4WS:netpbm-devel-0:10.35.58-8.el4.s390x", "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64", "4WS:netpbm-progs-0:10.35.58-8.el4.i386", "4WS:netpbm-progs-0:10.35.58-8.el4.ia64", "4WS:netpbm-progs-0:10.35.58-8.el4.ppc", "4WS:netpbm-progs-0:10.35.58-8.el4.s390", "4WS:netpbm-progs-0:10.35.58-8.el4.s390x", "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src", "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x", "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.