Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-4274 (GCVE-0-2009-4274)
Vulnerability from cvelistv5
Published
2010-02-12 21:00
Modified
2024-08-07 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.362Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2011:1811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"name": "ADV-2010-0358",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"name": "38530",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38530"
},
{
"name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"name": "ADV-2010-0780",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"name": "netpbm-xpm-bo(56207)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"name": "SUSE-SR:2010:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name": "DSA-2026",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"name": "38915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38915"
},
{
"name": "38164",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38164"
},
{
"name": "MDVSA-2010:039",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-02-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2011:1811",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"name": "ADV-2010-0358",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"name": "38530",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38530"
},
{
"name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"name": "ADV-2010-0780",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"name": "netpbm-xpm-bo(56207)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"name": "SUSE-SR:2010:006",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name": "DSA-2026",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"name": "38915",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38915"
},
{
"name": "38164",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38164"
},
{
"name": "MDVSA-2010:039",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-4274",
"datePublished": "2010-02-12T21:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.362Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-4274\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-02-12T21:30:00.533\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en pila en converter/ppm/xpmtoppm.c en netpbm anterior a v10.47.07, permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio(ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de imagen XPM que contiene un campo de cabecera (header) manipulado asociado con un valor alto del \u00edndice de color.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F79F02C3-950F-4D47-971A-3C1367F1642C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0344253A-AF59-499B-81DF-5494A34B115F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7297482-7D30-484A-8F8D-AFEA2E468725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93BA3D19-C291-468E-9E4E-E8374AE1BD32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CF9240-FAEE-4BA2-8374-8B81F738521A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45457716-9219-4A88-A824-B45FA16643D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A0526D-918E-4FAE-90AF-2BA49F9D5276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD350ED-1327-483A-BF73-02AB9924EDED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C11849-BCD4-4982-A779-435669BD668F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C94984E9-22EE-4B24-AFCB-52137A871117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B10069-89E1-4E63-BCFF-C210CE3C5655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC42B061-EB8E-49B4-B041-42B31672C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFAE142A-4F71-4452-8DAD-9D6BA11EBF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179366EE-D637-4345-8759-81D5E12EFFA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725CFC44-43C8-47FF-9935-FA006B6338FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A331F93-08C2-4F45-98AD-46DBE38A9785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFB0157-CF91-4FCB-8786-4024595B3EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92045C29-20B4-46D0-9643-491BB0642D12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148A51ED-1A00-45D3-934E-96CA2759F5A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BE0692-E688-4438-98C7-FA1FCE05F41C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1904CB89-F576-4DFF-9639-9263D0ADE0B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D11F39-3B4F-43E4-AC5E-E1B5931BCBB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97023E9B-520D-4E6F-BA7F-052BA89BF2E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A152B4-8483-4874-88C0-4679831BB60E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBAE4A7-B0E1-4E50-8775-CAEF3E49B7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE78BA1-4001-4676-8BCB-FBC081A5D733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF606C17-AD8A-4D81-AB55-50B0C4B7763F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906047FD-1D75-4F97-977D-2A22A1DC87B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA92693-6629-4A8D-9C54-418569C852F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F078E1C6-3FB7-415B-A49A-455BE55148B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F97984A-04F4-4F69-B03B-D06FD0F21EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53FB010A-9B82-41F9-9DDB-4DCC0BFA0365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07292430-0952-4E40-9012-1DD5709D2F9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"019C4B30-4F04-4068-80B1-884F9607EC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F74038FE-C361-415B-AC47-744D3792E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6B8C20-2603-4BC6-A9C5-363E45B86492\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16998237-B53D-4E6C-B2E7-3C17BE483780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4998E602-7E72-4ED9-806F-2DF117827F24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A01D9E5-14BD-416D-8363-278FBA991BE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B55BD5-0E1C-4A13-965C-BAFBE480C384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC498C66-4E32-4E4B-9BB0-3943CB963BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF4F989C-B9AF-4A0D-A39E-A9405E38229F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FCC7D4D-09B1-4063-9FE8-F88032B91FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEF8AB55-8A95-47CD-960A-E9A920632B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB45C9DA-9503-4F5C-8079-0C47E778EAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1D6ABC-D56F-4484-90D0-45CD3E7B682C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48121BF-EDA1-4EAD-B24B-7BAF6668D4BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E079966-8423-4638-8A55-BC9F2412D4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE5E653-3B78-4DCE-9FE8-1126FC18D8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D339F6D7-9E9A-46C2-9823-E534F3BEBDC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A829E428-77AA-4B8F-B4E6-BB89F0054F20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6470755-BE74-49FB-B4C7-6869FB33A096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FEFA0BB-1542-4A88-BC95-A60AAEF90D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090C90E2-D688-44C2-88D7-E40F7D919FA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675512A2-6E2A-46BA-9237-114B4EA6248F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185FF47F-321E-4D26-893D-BB4F4B532670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B402DB46-6103-4428-B6BF-9263D9270EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599D4BAC-1266-4A30-A4C5-4BA13EC47F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23241E2B-21B9-4C97-B865-5C3652C27401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A40DC0-AE35-4597-8A55-D5022289435E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12B85A1-5607-4037-A362-0270EF710514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B39A1A-DC18-413E-A869-9D6C7C77BF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F62F30D-F8D9-4B47-9CFC-8F54B3F589C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B0ACB2-FE13-4145-8EAE-9D6FB7FEDD60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0253F8B8-346C-40F0-9225-4593EAF39861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2411D682-BEB2-41E0-B211-4E8EA0E551C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97036446-8A06-4AB6-842B-2186A88FBB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9F56AC-906E-4713-83ED-79A8673F59BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77A17C7-C323-4182-A099-BB3E92BF12D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DB51EA-A050-417A-8603-97BD33ACB9B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48468D84-76E9-476D-8470-3950C8281118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7472AD57-68B3-43BE-95D4-F21D39708A4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA0C21F-DB95-43D9-B7B2-B076043828E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3658F6EA-E897-4A24-AD82-F3EBD4567D27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F887C654-43D9-4374-88D8-DCA800B7F449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34001491-58AD-4F6C-9159-C27671EA1574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"347D3197-1915-4417-B72D-0C23BEFBAA32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0256E7B3-E119-41A4-B49D-4C08D364C22C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EA3DD4D-28E0-4266-9024-A4DFF832512E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02FAFCFB-0D3F-4906-ADCE-BF7F06167692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB184F25-C4ED-4655-B79D-6B00E22F9097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43FC34D4-576B-46D6-B13C-EE17C0A5AAE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0618AF8A-0927-45CC-8BF5-93B1083B8147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A715086-7459-4E99-8936-49F77323D17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979690E7-827E-4131-A3CD-235340A2FC2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD21B69B-5500-4130-9603-F46998AC7D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E222667-1825-4377-AD6E-5C88979CD5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA2DCC3-007C-4EA4-BD2B-18C776D3CBAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A9A4DD-FCE5-4585-97A5-F91120F9F2D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A8E6AAC-2DFD-4E6F-BAFA-FC002E7FBF78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C739F6A-7DA4-4069-827D-B78DA08E4C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BE3C40-8066-4C41-A566-F89236D5F112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66AB52D-ECF8-4D0E-906F-7FA1AC41CD84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11B4771-81FF-4FA4-AB56-0BD51AFF10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E831F-F5FB-487F-9359-A7188C2206BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"756FB7A1-2FD3-40A6-B992-5D5FF0E6A736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CEA68F-46F0-4795-9839-D961FC1A394F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A6F7C0A-FF13-4C64-B9D3-5E71FCF87813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B20DFC28-0489-404A-8783-DCA6157EACCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533419D8-A51D-4C51-A898-7E9068722FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141EBC6-830D-4ADD-8D03-DB528FF3E117\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38530\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/38915\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2026\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:039\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/02/09/11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1811.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/38164\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0358\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0780\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546580\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56207\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/02/09/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1811.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/38164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=546580\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/56207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4274\\n\\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/\",\"lastModified\":\"2010-02-17T00:00:00\"}]}}"
}
}
fkie_cve-2009-4274
Vulnerability from fkie_nvd
Published
2010-02-12 21:30
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html | ||
| secalert@redhat.com | http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076 | ||
| secalert@redhat.com | http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup | ||
| secalert@redhat.com | http://secunia.com/advisories/38530 | ||
| secalert@redhat.com | http://secunia.com/advisories/38915 | ||
| secalert@redhat.com | http://www.debian.org/security/2010/dsa-2026 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2010:039 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2010/02/09/11 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2011-1811.html | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/38164 | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0358 | Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2010/0780 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=546580 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/56207 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch&r1=995&r2=1076&pathrev=1076 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38530 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38915 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2010/dsa-2026 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:039 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2010/02/09/11 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-1811.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/38164 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0358 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0780 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=546580 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/56207 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| netpbm | netpbm | 10.0 | |
| netpbm | netpbm | 10.1 | |
| netpbm | netpbm | 10.2 | |
| netpbm | netpbm | 10.3 | |
| netpbm | netpbm | 10.4 | |
| netpbm | netpbm | 10.5 | |
| netpbm | netpbm | 10.6 | |
| netpbm | netpbm | 10.7 | |
| netpbm | netpbm | 10.8 | |
| netpbm | netpbm | 10.9 | |
| netpbm | netpbm | 10.10 | |
| netpbm | netpbm | 10.11 | |
| netpbm | netpbm | 10.12 | |
| netpbm | netpbm | 10.13 | |
| netpbm | netpbm | 10.14 | |
| netpbm | netpbm | 10.15 | |
| netpbm | netpbm | 10.16 | |
| netpbm | netpbm | 10.17 | |
| netpbm | netpbm | 10.18 | |
| netpbm | netpbm | 10.19 | |
| netpbm | netpbm | 10.20 | |
| netpbm | netpbm | 10.21 | |
| netpbm | netpbm | 10.22 | |
| netpbm | netpbm | 10.23 | |
| netpbm | netpbm | 10.24 | |
| netpbm | netpbm | 10.25 | |
| netpbm | netpbm | 10.26 | |
| netpbm | netpbm | 10.27 | |
| netpbm | netpbm | 10.28 | |
| netpbm | netpbm | 10.29 | |
| netpbm | netpbm | 10.30 | |
| netpbm | netpbm | 10.31 | |
| netpbm | netpbm | 10.32 | |
| netpbm | netpbm | 10.33 | |
| netpbm | netpbm | 10.34 | |
| netpbm | netpbm | 10.35.00 | |
| netpbm | netpbm | 10.35.01 | |
| netpbm | netpbm | 10.35.02 | |
| netpbm | netpbm | 10.35.03 | |
| netpbm | netpbm | 10.35.04 | |
| netpbm | netpbm | 10.35.05 | |
| netpbm | netpbm | 10.35.06 | |
| netpbm | netpbm | 10.35.07 | |
| netpbm | netpbm | 10.35.08 | |
| netpbm | netpbm | 10.35.09 | |
| netpbm | netpbm | 10.35.10 | |
| netpbm | netpbm | 10.35.11 | |
| netpbm | netpbm | 10.35.12 | |
| netpbm | netpbm | 10.35.13 | |
| netpbm | netpbm | 10.35.14 | |
| netpbm | netpbm | 10.35.15 | |
| netpbm | netpbm | 10.35.16 | |
| netpbm | netpbm | 10.35.17 | |
| netpbm | netpbm | 10.35.18 | |
| netpbm | netpbm | 10.35.19 | |
| netpbm | netpbm | 10.35.20 | |
| netpbm | netpbm | 10.35.21 | |
| netpbm | netpbm | 10.35.22 | |
| netpbm | netpbm | 10.35.23 | |
| netpbm | netpbm | 10.35.24 | |
| netpbm | netpbm | 10.35.25 | |
| netpbm | netpbm | 10.35.26 | |
| netpbm | netpbm | 10.35.27 | |
| netpbm | netpbm | 10.35.28 | |
| netpbm | netpbm | 10.35.29 | |
| netpbm | netpbm | 10.35.30 | |
| netpbm | netpbm | 10.35.31 | |
| netpbm | netpbm | 10.35.32 | |
| netpbm | netpbm | 10.35.33 | |
| netpbm | netpbm | 10.35.34 | |
| netpbm | netpbm | 10.35.35 | |
| netpbm | netpbm | 10.35.36 | |
| netpbm | netpbm | 10.35.37 | |
| netpbm | netpbm | 10.35.38 | |
| netpbm | netpbm | 10.35.39 | |
| netpbm | netpbm | 10.35.40 | |
| netpbm | netpbm | 10.35.41 | |
| netpbm | netpbm | 10.35.42 | |
| netpbm | netpbm | 10.35.43 | |
| netpbm | netpbm | 10.35.44 | |
| netpbm | netpbm | 10.35.45 | |
| netpbm | netpbm | 10.35.46 | |
| netpbm | netpbm | 10.35.47 | |
| netpbm | netpbm | 10.36.00 | |
| netpbm | netpbm | 10.37.00 | |
| netpbm | netpbm | 10.38.00 | |
| netpbm | netpbm | 10.39.00 | |
| netpbm | netpbm | 10.40.00 | |
| netpbm | netpbm | 10.41.00 | |
| netpbm | netpbm | 10.42.00 | |
| netpbm | netpbm | 10.43.00 | |
| netpbm | netpbm | 10.44.00 | |
| netpbm | netpbm | 10.45.00 | |
| netpbm | netpbm | 10.46.00 | |
| netpbm | netpbm | 10.47.00 | |
| netpbm | netpbm | 10.47.01 | |
| netpbm | netpbm | 10.47.02 | |
| netpbm | netpbm | 10.47.03 | |
| netpbm | netpbm | 10.47.04 | |
| netpbm | netpbm | 10.47.05 | |
| netpbm | netpbm | 10.47.06 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F79F02C3-950F-4D47-971A-3C1367F1642C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0344253A-AF59-499B-81DF-5494A34B115F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7297482-7D30-484A-8F8D-AFEA2E468725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "93BA3D19-C291-468E-9E4E-E8374AE1BD32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "85CF9240-FAEE-4BA2-8374-8B81F738521A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "45457716-9219-4A88-A824-B45FA16643D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "93A0526D-918E-4FAE-90AF-2BA49F9D5276",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7AD350ED-1327-483A-BF73-02AB9924EDED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*",
"matchCriteriaId": "98C11849-BCD4-4982-A779-435669BD668F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C94984E9-22EE-4B24-AFCB-52137A871117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "23B10069-89E1-4E63-BCFF-C210CE3C5655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EC42B061-EB8E-49B4-B041-42B31672C42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*",
"matchCriteriaId": "DFAE142A-4F71-4452-8DAD-9D6BA11EBF4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*",
"matchCriteriaId": "179366EE-D637-4345-8759-81D5E12EFFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*",
"matchCriteriaId": "725CFC44-43C8-47FF-9935-FA006B6338FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*",
"matchCriteriaId": "3A331F93-08C2-4F45-98AD-46DBE38A9785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FEFB0157-CF91-4FCB-8786-4024595B3EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*",
"matchCriteriaId": "92045C29-20B4-46D0-9643-491BB0642D12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*",
"matchCriteriaId": "148A51ED-1A00-45D3-934E-96CA2759F5A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*",
"matchCriteriaId": "77BE0692-E688-4438-98C7-FA1FCE05F41C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "1904CB89-F576-4DFF-9639-9263D0ADE0B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50D11F39-3B4F-43E4-AC5E-E1B5931BCBB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*",
"matchCriteriaId": "97023E9B-520D-4E6F-BA7F-052BA89BF2E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*",
"matchCriteriaId": "93A152B4-8483-4874-88C0-4679831BB60E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBAE4A7-B0E1-4E50-8775-CAEF3E49B7EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE78BA1-4001-4676-8BCB-FBC081A5D733",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "FF606C17-AD8A-4D81-AB55-50B0C4B7763F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*",
"matchCriteriaId": "906047FD-1D75-4F97-977D-2A22A1DC87B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA92693-6629-4A8D-9C54-418569C852F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*",
"matchCriteriaId": "F078E1C6-3FB7-415B-A49A-455BE55148B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "9F97984A-04F4-4F69-B03B-D06FD0F21EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*",
"matchCriteriaId": "53FB010A-9B82-41F9-9DDB-4DCC0BFA0365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*",
"matchCriteriaId": "07292430-0952-4E40-9012-1DD5709D2F9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*",
"matchCriteriaId": "019C4B30-4F04-4068-80B1-884F9607EC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*",
"matchCriteriaId": "F74038FE-C361-415B-AC47-744D3792E707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6B8C20-2603-4BC6-A9C5-363E45B86492",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*",
"matchCriteriaId": "16998237-B53D-4E6C-B2E7-3C17BE483780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*",
"matchCriteriaId": "4998E602-7E72-4ED9-806F-2DF117827F24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*",
"matchCriteriaId": "5A01D9E5-14BD-416D-8363-278FBA991BE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*",
"matchCriteriaId": "59B55BD5-0E1C-4A13-965C-BAFBE480C384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*",
"matchCriteriaId": "EC498C66-4E32-4E4B-9BB0-3943CB963BC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4F989C-B9AF-4A0D-A39E-A9405E38229F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*",
"matchCriteriaId": "1FCC7D4D-09B1-4063-9FE8-F88032B91FA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF8AB55-8A95-47CD-960A-E9A920632B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*",
"matchCriteriaId": "FB45C9DA-9503-4F5C-8079-0C47E778EAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1D6ABC-D56F-4484-90D0-45CD3E7B682C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B48121BF-EDA1-4EAD-B24B-7BAF6668D4BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9E079966-8423-4638-8A55-BC9F2412D4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE5E653-3B78-4DCE-9FE8-1126FC18D8B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D339F6D7-9E9A-46C2-9823-E534F3BEBDC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*",
"matchCriteriaId": "A829E428-77AA-4B8F-B4E6-BB89F0054F20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A6470755-BE74-49FB-B4C7-6869FB33A096",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*",
"matchCriteriaId": "7FEFA0BB-1542-4A88-BC95-A60AAEF90D5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*",
"matchCriteriaId": "090C90E2-D688-44C2-88D7-E40F7D919FA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*",
"matchCriteriaId": "675512A2-6E2A-46BA-9237-114B4EA6248F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*",
"matchCriteriaId": "185FF47F-321E-4D26-893D-BB4F4B532670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*",
"matchCriteriaId": "B402DB46-6103-4428-B6BF-9263D9270EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*",
"matchCriteriaId": "599D4BAC-1266-4A30-A4C5-4BA13EC47F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*",
"matchCriteriaId": "23241E2B-21B9-4C97-B865-5C3652C27401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A40DC0-AE35-4597-8A55-D5022289435E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*",
"matchCriteriaId": "C12B85A1-5607-4037-A362-0270EF710514",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*",
"matchCriteriaId": "03B39A1A-DC18-413E-A869-9D6C7C77BF8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*",
"matchCriteriaId": "4F62F30D-F8D9-4B47-9CFC-8F54B3F589C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0ACB2-FE13-4145-8EAE-9D6FB7FEDD60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*",
"matchCriteriaId": "0253F8B8-346C-40F0-9225-4593EAF39861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2411D682-BEB2-41E0-B211-4E8EA0E551C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*",
"matchCriteriaId": "97036446-8A06-4AB6-842B-2186A88FBB1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9F56AC-906E-4713-83ED-79A8673F59BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A77A17C7-C323-4182-A099-BB3E92BF12D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*",
"matchCriteriaId": "82DB51EA-A050-417A-8603-97BD33ACB9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*",
"matchCriteriaId": "48468D84-76E9-476D-8470-3950C8281118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*",
"matchCriteriaId": "7472AD57-68B3-43BE-95D4-F21D39708A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA0C21F-DB95-43D9-B7B2-B076043828E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*",
"matchCriteriaId": "3658F6EA-E897-4A24-AD82-F3EBD4567D27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*",
"matchCriteriaId": "F887C654-43D9-4374-88D8-DCA800B7F449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*",
"matchCriteriaId": "34001491-58AD-4F6C-9159-C27671EA1574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*",
"matchCriteriaId": "347D3197-1915-4417-B72D-0C23BEFBAA32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0256E7B3-E119-41A4-B49D-4C08D364C22C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA3DD4D-28E0-4266-9024-A4DFF832512E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*",
"matchCriteriaId": "02FAFCFB-0D3F-4906-ADCE-BF7F06167692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*",
"matchCriteriaId": "EB184F25-C4ED-4655-B79D-6B00E22F9097",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*",
"matchCriteriaId": "43FC34D4-576B-46D6-B13C-EE17C0A5AAE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:*",
"matchCriteriaId": "0618AF8A-0927-45CC-8BF5-93B1083B8147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:*",
"matchCriteriaId": "4A715086-7459-4E99-8936-49F77323D17C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:*",
"matchCriteriaId": "979690E7-827E-4131-A3CD-235340A2FC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:*",
"matchCriteriaId": "AD21B69B-5500-4130-9603-F46998AC7D96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:*",
"matchCriteriaId": "0E222667-1825-4377-AD6E-5C88979CD5A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:*",
"matchCriteriaId": "AFA2DCC3-007C-4EA4-BD2B-18C776D3CBAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A9A4DD-FCE5-4585-97A5-F91120F9F2D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9A8E6AAC-2DFD-4E6F-BAFA-FC002E7FBF78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9C739F6A-7DA4-4069-827D-B78DA08E4C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:*",
"matchCriteriaId": "04BE3C40-8066-4C41-A566-F89236D5F112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:*",
"matchCriteriaId": "A66AB52D-ECF8-4D0E-906F-7FA1AC41CD84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:*",
"matchCriteriaId": "C11B4771-81FF-4FA4-AB56-0BD51AFF10D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B15E831F-F5FB-487F-9359-A7188C2206BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:*",
"matchCriteriaId": "756FB7A1-2FD3-40A6-B992-5D5FF0E6A736",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:*",
"matchCriteriaId": "51CEA68F-46F0-4795-9839-D961FC1A394F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6F7C0A-FF13-4C64-B9D3-5E71FCF87813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:*",
"matchCriteriaId": "B20DFC28-0489-404A-8783-DCA6157EACCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:*",
"matchCriteriaId": "533419D8-A51D-4C51-A898-7E9068722FD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:*",
"matchCriteriaId": "E141EBC6-830D-4ADD-8D03-DB528FF3E117",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en pila en converter/ppm/xpmtoppm.c en netpbm anterior a v10.47.07, permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio(ca\u00edda de aplicaci\u00f3n) o posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo de imagen XPM que contiene un campo de cabecera (header) manipulado asociado con un valor alto del \u00edndice de color."
}
],
"id": "CVE-2009-4274",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-02-12T21:30:00.533",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"source": "secalert@redhat.com",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"source": "secalert@redhat.com",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/38530"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/38915"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/38164"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38530"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/38164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vendorComments": [
{
"comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-4274\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/",
"lastModified": "2010-02-17T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2009-4274
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2009-4274",
"description": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"id": "GSD-2009-4274",
"references": [
"https://www.suse.com/security/cve/CVE-2009-4274.html",
"https://www.debian.org/security/2010/dsa-2026",
"https://access.redhat.com/errata/RHSA-2011:1811",
"https://linux.oracle.com/cve/CVE-2009-4274.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-4274"
],
"details": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"id": "GSD-2009-4274",
"modified": "2023-12-13T01:19:45.850983Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-4274",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076",
"refsource": "MISC",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup",
"refsource": "MISC",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"name": "http://secunia.com/advisories/38530",
"refsource": "MISC",
"url": "http://secunia.com/advisories/38530"
},
{
"name": "http://secunia.com/advisories/38915",
"refsource": "MISC",
"url": "http://secunia.com/advisories/38915"
},
{
"name": "http://www.debian.org/security/2010/dsa-2026",
"refsource": "MISC",
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
},
{
"name": "http://www.openwall.com/lists/oss-security/2010/02/09/11",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2011-1811.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"name": "http://www.securityfocus.com/bid/38164",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/38164"
},
{
"name": "http://www.vupen.com/english/advisories/2010/0358",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"name": "http://www.vupen.com/english/advisories/2010/0780",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=546580",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.39.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.46.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.45.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.38.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.42.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.44.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.43.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.36.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.40.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.47.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.37.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.41.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-4274"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "38164",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/38164"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=546580",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"name": "[oss-security] 20100209 vulnerability in netpbm (CVE-2009-4274)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup",
"refsource": "CONFIRM",
"tags": [],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"name": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076",
"refsource": "CONFIRM",
"tags": [],
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"name": "ADV-2010-0358",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"name": "MDVSA-2010:039",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
},
{
"name": "38530",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38530"
},
{
"name": "38915",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38915"
},
{
"name": "SUSE-SR:2010:006",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"name": "ADV-2010-0780",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/0780"
},
{
"name": "DSA-2026",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"name": "RHSA-2011:1811",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"name": "netpbm-xpm-bo(56207)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T01:18Z",
"publishedDate": "2010-02-12T21:30Z"
}
}
}
ghsa-45q7-r4qg-42p8
Vulnerability from github
Published
2022-05-02 03:53
Modified
2022-05-02 03:53
VLAI Severity ?
Details
Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
{
"affected": [],
"aliases": [
"CVE-2009-4274"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2010-02-12T21:30:00Z",
"severity": "HIGH"
},
"details": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"id": "GHSA-45q7-r4qg-42p8",
"modified": "2022-05-02T03:53:17Z",
"published": "2022-05-02T03:53:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2009-4274"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56207"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
},
{
"type": "WEB",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/converter/ppm/xpmtoppm.c?view=patch\u0026r1=995\u0026r2=1076\u0026pathrev=1076"
},
{
"type": "WEB",
"url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY?view=markup"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/38530"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/38915"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2010/dsa-2026"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:039"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2010/02/09/11"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1811.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/38164"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/0358"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2010/0780"
}
],
"schema_version": "1.4.0",
"severity": []
}
rhsa-2011_1811
Vulnerability from csaf_redhat
Published
2011-12-12 20:57
Modified
2024-11-22 04:53
Summary
Red Hat Security Advisory: netpbm security update
Notes
Topic
Updated netpbm packages that fix three security issues are now available
for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The netpbm packages contain a library of functions which support programs
for handling various graphics file formats, including .pbm (Portable Bit
Map), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable
Pixel Map), and others.
Two heap-based buffer overflow flaws were found in the embedded JasPer
library, which is used to provide support for Part 1 of the JPEG 2000 image
compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker
could create a malicious JPEG 2000 compressed image file that could cause
jpeg2ktopam to crash or, potentially, execute arbitrary code with the
privileges of the user running jpeg2ktopam. These flaws do not affect
pamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)
A stack-based buffer overflow flaw was found in the way the xpmtoppm tool
processed X PixMap (XPM) image files. An attacker could create a malicious
XPM file that would cause xpmtoppm to crash or, potentially, execute
arbitrary code with the privileges of the user running xpmtoppm.
(CVE-2009-4274)
Red Hat would like to thank Jonathan Foote of the CERT Coordination Center
for reporting the CVE-2011-4516 and CVE-2011-4517 issues.
All users of netpbm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated netpbm packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The netpbm packages contain a library of functions which support programs\nfor handling various graphics file formats, including .pbm (Portable Bit\nMap), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable\nPixel Map), and others.\n\nTwo heap-based buffer overflow flaws were found in the embedded JasPer\nlibrary, which is used to provide support for Part 1 of the JPEG 2000 image\ncompression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker\ncould create a malicious JPEG 2000 compressed image file that could cause\njpeg2ktopam to crash or, potentially, execute arbitrary code with the\nprivileges of the user running jpeg2ktopam. These flaws do not affect\npamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)\n\nA stack-based buffer overflow flaw was found in the way the xpmtoppm tool\nprocessed X PixMap (XPM) image files. An attacker could create a malicious\nXPM file that would cause xpmtoppm to crash or, potentially, execute\narbitrary code with the privileges of the user running xpmtoppm.\n(CVE-2009-4274)\n\nRed Hat would like to thank Jonathan Foote of the CERT Coordination Center\nfor reporting the CVE-2011-4516 and CVE-2011-4517 issues.\n\nAll users of netpbm are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1811",
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1811.json"
}
],
"title": "Red Hat Security Advisory: netpbm security update",
"tracking": {
"current_release_date": "2024-11-22T04:53:14+00:00",
"generator": {
"date": "2024-11-22T04:53:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:1811",
"initial_release_date": "2011-12-12T20:57:00+00:00",
"revision_history": [
{
"date": "2011-12-12T20:57:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-12T21:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:53:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el4.i386",
"product_id": "netpbm-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.src",
"product": {
"name": "netpbm-0:10.35.58-8.el4.src",
"product_id": "netpbm-0:10.35.58-8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390",
"product_id": "netpbm-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4274",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "546580"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4274"
},
{
"category": "external",
"summary": "RHBZ#546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4274",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4274"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274"
}
],
"release_date": "2010-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4516",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4516"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4517",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4517"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
}
]
}
RHSA-2011:1811
Vulnerability from csaf_redhat
Published
2011-12-12 20:57
Modified
2025-10-09 13:26
Summary
Red Hat Security Advisory: netpbm security update
Notes
Topic
Updated netpbm packages that fix three security issues are now available
for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The netpbm packages contain a library of functions which support programs
for handling various graphics file formats, including .pbm (Portable Bit
Map), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable
Pixel Map), and others.
Two heap-based buffer overflow flaws were found in the embedded JasPer
library, which is used to provide support for Part 1 of the JPEG 2000 image
compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker
could create a malicious JPEG 2000 compressed image file that could cause
jpeg2ktopam to crash or, potentially, execute arbitrary code with the
privileges of the user running jpeg2ktopam. These flaws do not affect
pamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)
A stack-based buffer overflow flaw was found in the way the xpmtoppm tool
processed X PixMap (XPM) image files. An attacker could create a malicious
XPM file that would cause xpmtoppm to crash or, potentially, execute
arbitrary code with the privileges of the user running xpmtoppm.
(CVE-2009-4274)
Red Hat would like to thank Jonathan Foote of the CERT Coordination Center
for reporting the CVE-2011-4516 and CVE-2011-4517 issues.
All users of netpbm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated netpbm packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The netpbm packages contain a library of functions which support programs\nfor handling various graphics file formats, including .pbm (Portable Bit\nMap), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable\nPixel Map), and others.\n\nTwo heap-based buffer overflow flaws were found in the embedded JasPer\nlibrary, which is used to provide support for Part 1 of the JPEG 2000 image\ncompression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker\ncould create a malicious JPEG 2000 compressed image file that could cause\njpeg2ktopam to crash or, potentially, execute arbitrary code with the\nprivileges of the user running jpeg2ktopam. These flaws do not affect\npamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)\n\nA stack-based buffer overflow flaw was found in the way the xpmtoppm tool\nprocessed X PixMap (XPM) image files. An attacker could create a malicious\nXPM file that would cause xpmtoppm to crash or, potentially, execute\narbitrary code with the privileges of the user running xpmtoppm.\n(CVE-2009-4274)\n\nRed Hat would like to thank Jonathan Foote of the CERT Coordination Center\nfor reporting the CVE-2011-4516 and CVE-2011-4517 issues.\n\nAll users of netpbm are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1811",
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1811.json"
}
],
"title": "Red Hat Security Advisory: netpbm security update",
"tracking": {
"current_release_date": "2025-10-09T13:26:38+00:00",
"generator": {
"date": "2025-10-09T13:26:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2011:1811",
"initial_release_date": "2011-12-12T20:57:00+00:00",
"revision_history": [
{
"date": "2011-12-12T20:57:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-12T21:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:26:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el4.i386",
"product_id": "netpbm-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.src",
"product": {
"name": "netpbm-0:10.35.58-8.el4.src",
"product_id": "netpbm-0:10.35.58-8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390",
"product_id": "netpbm-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4274",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "546580"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4274"
},
{
"category": "external",
"summary": "RHBZ#546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4274",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4274"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274"
}
],
"release_date": "2010-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4516",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4516"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4517",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4517"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
}
]
}
rhsa-2011:1811
Vulnerability from csaf_redhat
Published
2011-12-12 20:57
Modified
2025-10-09 13:26
Summary
Red Hat Security Advisory: netpbm security update
Notes
Topic
Updated netpbm packages that fix three security issues are now available
for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The netpbm packages contain a library of functions which support programs
for handling various graphics file formats, including .pbm (Portable Bit
Map), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable
Pixel Map), and others.
Two heap-based buffer overflow flaws were found in the embedded JasPer
library, which is used to provide support for Part 1 of the JPEG 2000 image
compression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker
could create a malicious JPEG 2000 compressed image file that could cause
jpeg2ktopam to crash or, potentially, execute arbitrary code with the
privileges of the user running jpeg2ktopam. These flaws do not affect
pamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)
A stack-based buffer overflow flaw was found in the way the xpmtoppm tool
processed X PixMap (XPM) image files. An attacker could create a malicious
XPM file that would cause xpmtoppm to crash or, potentially, execute
arbitrary code with the privileges of the user running xpmtoppm.
(CVE-2009-4274)
Red Hat would like to thank Jonathan Foote of the CERT Coordination Center
for reporting the CVE-2011-4516 and CVE-2011-4517 issues.
All users of netpbm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated netpbm packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The netpbm packages contain a library of functions which support programs\nfor handling various graphics file formats, including .pbm (Portable Bit\nMap), .pgm (Portable Gray Map), .pnm (Portable Any Map), .ppm (Portable\nPixel Map), and others.\n\nTwo heap-based buffer overflow flaws were found in the embedded JasPer\nlibrary, which is used to provide support for Part 1 of the JPEG 2000 image\ncompression standard in the jpeg2ktopam and pamtojpeg2k tools. An attacker\ncould create a malicious JPEG 2000 compressed image file that could cause\njpeg2ktopam to crash or, potentially, execute arbitrary code with the\nprivileges of the user running jpeg2ktopam. These flaws do not affect\npamtojpeg2k. (CVE-2011-4516, CVE-2011-4517)\n\nA stack-based buffer overflow flaw was found in the way the xpmtoppm tool\nprocessed X PixMap (XPM) image files. An attacker could create a malicious\nXPM file that would cause xpmtoppm to crash or, potentially, execute\narbitrary code with the privileges of the user running xpmtoppm.\n(CVE-2009-4274)\n\nRed Hat would like to thank Jonathan Foote of the CERT Coordination Center\nfor reporting the CVE-2011-4516 and CVE-2011-4517 issues.\n\nAll users of netpbm are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:1811",
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1811.json"
}
],
"title": "Red Hat Security Advisory: netpbm security update",
"tracking": {
"current_release_date": "2025-10-09T13:26:38+00:00",
"generator": {
"date": "2025-10-09T13:26:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2011:1811",
"initial_release_date": "2011-12-12T20:57:00+00:00",
"revision_history": [
{
"date": "2011-12-12T20:57:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-12-12T21:06:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T13:26:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "RHEL Desktop Workstation (v. 5 client)",
"product": {
"name": "RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el4.i386",
"product_id": "netpbm-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.src",
"product": {
"name": "netpbm-0:10.35.58-8.el4.src",
"product_id": "netpbm-0:10.35.58-8.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el4.s390",
"product_id": "netpbm-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_id": "netpbm-progs-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-progs@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-devel@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm@10.35.58-8.el5_7.3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_id": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netpbm-debuginfo@10.35.58-8.el5_7.3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.src"
},
"product_reference": "netpbm-0:10.35.58-8.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-devel-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:netpbm-progs-0:10.35.58-8.el4.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Client-Workstation-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.src",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"relates_to_product_reference": "5Server-5.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
},
"product_reference": "netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"relates_to_product_reference": "5Server-5.7.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4274",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "546580"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4274"
},
{
"category": "external",
"summary": "RHBZ#546580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4274",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4274"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4274"
}
],
"release_date": "2010-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netpbm: Stack-based buffer overflow by processing X PixMap image header fields"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4516",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4516"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4516"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4516"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Foote"
],
"organization": "CERT Coordination Center"
}
],
"cve": "CVE-2011-4517",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2011-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "747726"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 compressed image files. An attacker could create a malicious JPEG 2000 compressed image file that, when opened, would cause applications that use JasPer (such as Nautilus) to crash or, potentially, execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4517"
},
{
"category": "external",
"summary": "RHBZ#747726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4517"
}
],
"release_date": "2011-12-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-12-12T20:57:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:1811"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:netpbm-0:10.35.58-8.el4.i386",
"4AS:netpbm-0:10.35.58-8.el4.ia64",
"4AS:netpbm-0:10.35.58-8.el4.ppc",
"4AS:netpbm-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-0:10.35.58-8.el4.s390",
"4AS:netpbm-0:10.35.58-8.el4.s390x",
"4AS:netpbm-0:10.35.58-8.el4.src",
"4AS:netpbm-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4AS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-devel-0:10.35.58-8.el4.i386",
"4AS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4AS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390",
"4AS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4AS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4AS:netpbm-progs-0:10.35.58-8.el4.i386",
"4AS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4AS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390",
"4AS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4AS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-0:10.35.58-8.el4.src",
"4Desktop:netpbm-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.i386",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ia64",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.ppc",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.s390x",
"4Desktop:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-0:10.35.58-8.el4.i386",
"4ES:netpbm-0:10.35.58-8.el4.ia64",
"4ES:netpbm-0:10.35.58-8.el4.ppc",
"4ES:netpbm-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-0:10.35.58-8.el4.s390",
"4ES:netpbm-0:10.35.58-8.el4.s390x",
"4ES:netpbm-0:10.35.58-8.el4.src",
"4ES:netpbm-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4ES:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-devel-0:10.35.58-8.el4.i386",
"4ES:netpbm-devel-0:10.35.58-8.el4.ia64",
"4ES:netpbm-devel-0:10.35.58-8.el4.ppc",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390",
"4ES:netpbm-devel-0:10.35.58-8.el4.s390x",
"4ES:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4ES:netpbm-progs-0:10.35.58-8.el4.i386",
"4ES:netpbm-progs-0:10.35.58-8.el4.ia64",
"4ES:netpbm-progs-0:10.35.58-8.el4.ppc",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390",
"4ES:netpbm-progs-0:10.35.58-8.el4.s390x",
"4ES:netpbm-progs-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-0:10.35.58-8.el4.i386",
"4WS:netpbm-0:10.35.58-8.el4.ia64",
"4WS:netpbm-0:10.35.58-8.el4.ppc",
"4WS:netpbm-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-0:10.35.58-8.el4.s390",
"4WS:netpbm-0:10.35.58-8.el4.s390x",
"4WS:netpbm-0:10.35.58-8.el4.src",
"4WS:netpbm-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.i386",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ia64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.ppc64",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.s390x",
"4WS:netpbm-debuginfo-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-devel-0:10.35.58-8.el4.i386",
"4WS:netpbm-devel-0:10.35.58-8.el4.ia64",
"4WS:netpbm-devel-0:10.35.58-8.el4.ppc",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390",
"4WS:netpbm-devel-0:10.35.58-8.el4.s390x",
"4WS:netpbm-devel-0:10.35.58-8.el4.x86_64",
"4WS:netpbm-progs-0:10.35.58-8.el4.i386",
"4WS:netpbm-progs-0:10.35.58-8.el4.ia64",
"4WS:netpbm-progs-0:10.35.58-8.el4.ppc",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390",
"4WS:netpbm-progs-0:10.35.58-8.el4.s390x",
"4WS:netpbm-progs-0:10.35.58-8.el4.x86_64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Client-Workstation-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Client-Workstation-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.src",
"5Server-5.7.Z:netpbm-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-debuginfo-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.ppc64",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-devel-0:10.35.58-8.el5_7.3.x86_64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.i386",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ia64",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.ppc",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.s390x",
"5Server-5.7.Z:netpbm-progs-0:10.35.58-8.el5_7.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jasper: heap buffer overflow flaws lead to arbitrary code execution (CERT VU#887409)"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…