Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2010-3702
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-16662", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "name": "FEDORA-2010-15857", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "name": "RHSA-2010:0859", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "name": "42357", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42357" }, { "name": "MDVSA-2010:228", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "name": "ADV-2011-0230", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "name": "RHSA-2010:0752", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "MDVSA-2010:230", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "name": "SUSE-SR:2010:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "name": "RHSA-2012:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name": "43845", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43845" }, { "name": "MDVSA-2010:231", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "name": "FEDORA-2010-16705", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "name": "SSA:2010-324-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "name": "RHSA-2010:0751", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "name": "42397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42397" }, { "name": "42141", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42141" }, { "name": "FEDORA-2010-15911", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "name": "MDVSA-2012:144", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "name": "ADV-2010-3097", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "name": "USN-1005-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "name": "RHSA-2010:0749", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "name": "RHSA-2010:0754", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "name": "FEDORA-2010-15981", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "name": "FEDORA-2010-16744", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "name": "ADV-2010-2897", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "name": "42691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42691" }, { "name": "DSA-2119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "MDVSA-2010:229", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "name": "DSA-2135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "name": "RHSA-2010:0750", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "name": "RHSA-2010:0755", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "name": "RHSA-2010:0753", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "name": "43079", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-11-11T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2010-16662", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "name": "FEDORA-2010-15857", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "name": "RHSA-2010:0859", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "name": "42357", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42357" }, { "name": "MDVSA-2010:228", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "name": "ADV-2011-0230", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "name": "RHSA-2010:0752", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "name": "SUSE-SR:2010:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "MDVSA-2010:230", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "name": "SUSE-SR:2010:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "name": "RHSA-2012:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name": "43845", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43845" }, { "name": "MDVSA-2010:231", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "name": "FEDORA-2010-16705", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "name": "SSA:2010-324-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "name": "RHSA-2010:0751", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "name": "42397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42397" }, { "name": "42141", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42141" }, { "name": "FEDORA-2010-15911", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "name": "MDVSA-2012:144", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "name": "ADV-2010-3097", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "name": "USN-1005-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "name": "RHSA-2010:0749", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "name": "RHSA-2010:0754", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "name": "FEDORA-2010-15981", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "name": "FEDORA-2010-16744", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "name": "ADV-2010-2897", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "name": "42691", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42691" }, { "name": "DSA-2119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "MDVSA-2010:229", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "name": "DSA-2135", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "name": "RHSA-2010:0750", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "name": "RHSA-2010:0755", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "name": "RHSA-2010:0753", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "name": "43079", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43079" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3702", "datePublished": "2010-11-05T17:00:00", "dateReserved": "2010-10-01T00:00:00", "dateUpdated": "2024-08-07T03:18:52.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-3702\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-11-05T18:00:05.017\",\"lastModified\":\"2024-11-21T01:19:25.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n Gfx::getPos en el analizador PDF en Xpdf versi\u00f3n anterior a 3.02 PL5, Poppler versi\u00f3n 0.8.7 y posiblemente otras versiones hasta la 0.15.1, CUPS, kdegraphics, y posiblemente otros productos permite que los atacantes dependiendo del contexto generen una denegaci\u00f3n de servicio (bloqueo) por medio de vectores desconocidos que desencadenan una desreferencia de puntero no inicializada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.11\",\"matchCriteriaId\":\"08916364-08F4-4416-B84E-2BDD2DC0A3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.8.7\",\"versionEndIncluding\":\"0.15.1\",\"matchCriteriaId\":\"0432A227-B3A9-4672-B661-96C3F2F47764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.01\",\"matchCriteriaId\":\"8444F877-A312-4E37-9754-60CC7DE24CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA082A3C-AF4F-4436-BE42-C38D88A5154F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0509A882-65AF-41CA-AE90-CD59B8779354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B92D9ED-E5B3-420E-BBDB-C84518807F1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C892F205-4326-455E-8563-02971A93E3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F45309-0915-497C-BFAE-D9CA6A5D8C15\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44669D7-6C1E-4844-B78A-73E253A7CC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D59BD0-43DE-4E58-A057-640AB98359A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE52846-24EC-4068-B788-EC7F915FFF11\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5646FDE9-CF21-46A9-B89D-F5BBDB4249AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*\",\"matchCriteriaId\":\"79A35457-EAA3-4BF9-A4DA-B2E414A75A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F13F07CC-739B-465C-9184-0E9D708BD4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE26596F-F10E-44EF-88CA-0080646E91B9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1201.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42141\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42357\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42397\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42691\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43079\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2119\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2135\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/10/04/6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0749.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0750.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0751.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0752.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0753.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0754.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0755.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0859.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/43845\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1005-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2897\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3097\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0230\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=595245\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1201.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42357\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-2135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/10/04/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0749.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0750.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0751.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0752.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0753.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0754.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0755.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0859.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/43845\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1005-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=595245\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2010_0754
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix one security issue are now available for Red\nHat Enterprise Linux 3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems. The CUPS \"pdftops\" filter converts Portable\nDocument Format (PDF) files to PostScript.\n\nAn uninitialized pointer use flaw was discovered in the CUPS \"pdftops\"\nfilter. An attacker could create a malicious PDF file that, when printed,\nwould cause \"pdftops\" to crash or, potentially, execute arbitrary code as\nthe \"lp\" user. (CVE-2010-3702)\n\nUsers of cups are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. After installing this\nupdate, the cupsd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0754", "url": "https://access.redhat.com/errata/RHSA-2010:0754" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0754.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T03:44:54+00:00", "generator": { "date": "2024-11-22T03:44:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0754", "initial_release_date": "2010-10-07T17:27:00+00:00", "revision_history": [ { "date": "2010-10-07T17:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T13:28:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.ia64", "product": { "name": "cups-libs-1:1.1.17-13.3.70.ia64", "product_id": "cups-libs-1:1.1.17-13.3.70.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.ia64", "product": { "name": "cups-1:1.1.17-13.3.70.ia64", "product_id": "cups-1:1.1.17-13.3.70.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.ia64", "product": { "name": "cups-devel-1:1.1.17-13.3.70.ia64", "product_id": "cups-devel-1:1.1.17-13.3.70.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.i386", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.i386", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.i386", "product": { "name": "cups-libs-1:1.1.17-13.3.70.i386", "product_id": "cups-libs-1:1.1.17-13.3.70.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.i386", "product": { "name": "cups-1:1.1.17-13.3.70.i386", "product_id": "cups-1:1.1.17-13.3.70.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.i386", "product": { "name": "cups-devel-1:1.1.17-13.3.70.i386", "product_id": "cups-devel-1:1.1.17-13.3.70.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.x86_64", "product": { "name": "cups-libs-1:1.1.17-13.3.70.x86_64", "product_id": "cups-libs-1:1.1.17-13.3.70.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.x86_64", "product": { "name": "cups-1:1.1.17-13.3.70.x86_64", "product_id": "cups-1:1.1.17-13.3.70.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.x86_64", "product": { "name": "cups-devel-1:1.1.17-13.3.70.x86_64", "product_id": "cups-devel-1:1.1.17-13.3.70.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.src", "product": { "name": "cups-1:1.1.17-13.3.70.src", "product_id": "cups-1:1.1.17-13.3.70.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.ppc64", "product": { "name": "cups-libs-1:1.1.17-13.3.70.ppc64", "product_id": "cups-libs-1:1.1.17-13.3.70.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.ppc", "product": { "name": "cups-libs-1:1.1.17-13.3.70.ppc", "product_id": "cups-libs-1:1.1.17-13.3.70.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.ppc", "product": { "name": "cups-1:1.1.17-13.3.70.ppc", "product_id": "cups-1:1.1.17-13.3.70.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.ppc", "product": { "name": "cups-devel-1:1.1.17-13.3.70.ppc", "product_id": "cups-devel-1:1.1.17-13.3.70.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.s390x", "product": { "name": "cups-libs-1:1.1.17-13.3.70.s390x", "product_id": "cups-libs-1:1.1.17-13.3.70.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.s390x", "product": { "name": "cups-1:1.1.17-13.3.70.s390x", "product_id": "cups-1:1.1.17-13.3.70.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.s390x", "product": { "name": "cups-devel-1:1.1.17-13.3.70.s390x", "product_id": "cups-devel-1:1.1.17-13.3.70.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-debuginfo-1:1.1.17-13.3.70.s390", "product": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390", "product_id": "cups-debuginfo-1:1.1.17-13.3.70.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.17-13.3.70?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.1.17-13.3.70.s390", "product": { "name": "cups-libs-1:1.1.17-13.3.70.s390", "product_id": "cups-libs-1:1.1.17-13.3.70.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.17-13.3.70?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.17-13.3.70.s390", "product": { "name": "cups-1:1.1.17-13.3.70.s390", "product_id": "cups-1:1.1.17-13.3.70.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.17-13.3.70?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.17-13.3.70.s390", "product": { "name": "cups-devel-1:1.1.17-13.3.70.s390", "product_id": "cups-devel-1:1.1.17-13.3.70.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.17-13.3.70?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.src" }, "product_reference": "cups-1:1.1.17-13.3.70.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-debuginfo-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-devel-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:cups-libs-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.src" }, "product_reference": "cups-1:1.1.17-13.3.70.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-devel-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:cups-libs-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.src" }, "product_reference": "cups-1:1.1.17-13.3.70.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-debuginfo-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-devel-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:cups-libs-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.src" }, "product_reference": "cups-1:1.1.17-13.3.70.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-debuginfo-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-devel-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-devel-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.i386" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.ia64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.ppc" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.ppc64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.s390" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.s390x" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.17-13.3.70.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:cups-libs-1:1.1.17-13.3.70.x86_64" }, "product_reference": "cups-libs-1:1.1.17-13.3.70.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:cups-1:1.1.17-13.3.70.i386", "3AS:cups-1:1.1.17-13.3.70.ia64", "3AS:cups-1:1.1.17-13.3.70.ppc", "3AS:cups-1:1.1.17-13.3.70.s390", "3AS:cups-1:1.1.17-13.3.70.s390x", "3AS:cups-1:1.1.17-13.3.70.src", "3AS:cups-1:1.1.17-13.3.70.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3AS:cups-devel-1:1.1.17-13.3.70.i386", "3AS:cups-devel-1:1.1.17-13.3.70.ia64", "3AS:cups-devel-1:1.1.17-13.3.70.ppc", "3AS:cups-devel-1:1.1.17-13.3.70.s390", "3AS:cups-devel-1:1.1.17-13.3.70.s390x", "3AS:cups-devel-1:1.1.17-13.3.70.x86_64", "3AS:cups-libs-1:1.1.17-13.3.70.i386", "3AS:cups-libs-1:1.1.17-13.3.70.ia64", "3AS:cups-libs-1:1.1.17-13.3.70.ppc", "3AS:cups-libs-1:1.1.17-13.3.70.ppc64", "3AS:cups-libs-1:1.1.17-13.3.70.s390", "3AS:cups-libs-1:1.1.17-13.3.70.s390x", "3AS:cups-libs-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-1:1.1.17-13.3.70.i386", "3Desktop:cups-1:1.1.17-13.3.70.ia64", "3Desktop:cups-1:1.1.17-13.3.70.ppc", "3Desktop:cups-1:1.1.17-13.3.70.s390", "3Desktop:cups-1:1.1.17-13.3.70.s390x", "3Desktop:cups-1:1.1.17-13.3.70.src", "3Desktop:cups-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.70.i386", "3Desktop:cups-devel-1:1.1.17-13.3.70.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.70.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.70.i386", "3Desktop:cups-libs-1:1.1.17-13.3.70.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.70.x86_64", "3ES:cups-1:1.1.17-13.3.70.i386", "3ES:cups-1:1.1.17-13.3.70.ia64", "3ES:cups-1:1.1.17-13.3.70.ppc", "3ES:cups-1:1.1.17-13.3.70.s390", "3ES:cups-1:1.1.17-13.3.70.s390x", "3ES:cups-1:1.1.17-13.3.70.src", "3ES:cups-1:1.1.17-13.3.70.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3ES:cups-devel-1:1.1.17-13.3.70.i386", "3ES:cups-devel-1:1.1.17-13.3.70.ia64", "3ES:cups-devel-1:1.1.17-13.3.70.ppc", "3ES:cups-devel-1:1.1.17-13.3.70.s390", "3ES:cups-devel-1:1.1.17-13.3.70.s390x", "3ES:cups-devel-1:1.1.17-13.3.70.x86_64", "3ES:cups-libs-1:1.1.17-13.3.70.i386", "3ES:cups-libs-1:1.1.17-13.3.70.ia64", "3ES:cups-libs-1:1.1.17-13.3.70.ppc", "3ES:cups-libs-1:1.1.17-13.3.70.ppc64", "3ES:cups-libs-1:1.1.17-13.3.70.s390", "3ES:cups-libs-1:1.1.17-13.3.70.s390x", "3ES:cups-libs-1:1.1.17-13.3.70.x86_64", "3WS:cups-1:1.1.17-13.3.70.i386", "3WS:cups-1:1.1.17-13.3.70.ia64", "3WS:cups-1:1.1.17-13.3.70.ppc", "3WS:cups-1:1.1.17-13.3.70.s390", "3WS:cups-1:1.1.17-13.3.70.s390x", "3WS:cups-1:1.1.17-13.3.70.src", "3WS:cups-1:1.1.17-13.3.70.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3WS:cups-devel-1:1.1.17-13.3.70.i386", "3WS:cups-devel-1:1.1.17-13.3.70.ia64", "3WS:cups-devel-1:1.1.17-13.3.70.ppc", "3WS:cups-devel-1:1.1.17-13.3.70.s390", "3WS:cups-devel-1:1.1.17-13.3.70.s390x", "3WS:cups-devel-1:1.1.17-13.3.70.x86_64", "3WS:cups-libs-1:1.1.17-13.3.70.i386", "3WS:cups-libs-1:1.1.17-13.3.70.ia64", "3WS:cups-libs-1:1.1.17-13.3.70.ppc", "3WS:cups-libs-1:1.1.17-13.3.70.ppc64", "3WS:cups-libs-1:1.1.17-13.3.70.s390", "3WS:cups-libs-1:1.1.17-13.3.70.s390x", "3WS:cups-libs-1:1.1.17-13.3.70.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T17:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:cups-1:1.1.17-13.3.70.i386", "3AS:cups-1:1.1.17-13.3.70.ia64", "3AS:cups-1:1.1.17-13.3.70.ppc", "3AS:cups-1:1.1.17-13.3.70.s390", "3AS:cups-1:1.1.17-13.3.70.s390x", "3AS:cups-1:1.1.17-13.3.70.src", "3AS:cups-1:1.1.17-13.3.70.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3AS:cups-devel-1:1.1.17-13.3.70.i386", "3AS:cups-devel-1:1.1.17-13.3.70.ia64", "3AS:cups-devel-1:1.1.17-13.3.70.ppc", "3AS:cups-devel-1:1.1.17-13.3.70.s390", "3AS:cups-devel-1:1.1.17-13.3.70.s390x", "3AS:cups-devel-1:1.1.17-13.3.70.x86_64", "3AS:cups-libs-1:1.1.17-13.3.70.i386", "3AS:cups-libs-1:1.1.17-13.3.70.ia64", "3AS:cups-libs-1:1.1.17-13.3.70.ppc", "3AS:cups-libs-1:1.1.17-13.3.70.ppc64", "3AS:cups-libs-1:1.1.17-13.3.70.s390", "3AS:cups-libs-1:1.1.17-13.3.70.s390x", "3AS:cups-libs-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-1:1.1.17-13.3.70.i386", "3Desktop:cups-1:1.1.17-13.3.70.ia64", "3Desktop:cups-1:1.1.17-13.3.70.ppc", "3Desktop:cups-1:1.1.17-13.3.70.s390", "3Desktop:cups-1:1.1.17-13.3.70.s390x", "3Desktop:cups-1:1.1.17-13.3.70.src", "3Desktop:cups-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.70.i386", "3Desktop:cups-devel-1:1.1.17-13.3.70.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.70.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.70.i386", "3Desktop:cups-libs-1:1.1.17-13.3.70.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.70.x86_64", "3ES:cups-1:1.1.17-13.3.70.i386", "3ES:cups-1:1.1.17-13.3.70.ia64", "3ES:cups-1:1.1.17-13.3.70.ppc", "3ES:cups-1:1.1.17-13.3.70.s390", "3ES:cups-1:1.1.17-13.3.70.s390x", "3ES:cups-1:1.1.17-13.3.70.src", "3ES:cups-1:1.1.17-13.3.70.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3ES:cups-devel-1:1.1.17-13.3.70.i386", "3ES:cups-devel-1:1.1.17-13.3.70.ia64", "3ES:cups-devel-1:1.1.17-13.3.70.ppc", "3ES:cups-devel-1:1.1.17-13.3.70.s390", "3ES:cups-devel-1:1.1.17-13.3.70.s390x", "3ES:cups-devel-1:1.1.17-13.3.70.x86_64", "3ES:cups-libs-1:1.1.17-13.3.70.i386", "3ES:cups-libs-1:1.1.17-13.3.70.ia64", "3ES:cups-libs-1:1.1.17-13.3.70.ppc", "3ES:cups-libs-1:1.1.17-13.3.70.ppc64", "3ES:cups-libs-1:1.1.17-13.3.70.s390", "3ES:cups-libs-1:1.1.17-13.3.70.s390x", "3ES:cups-libs-1:1.1.17-13.3.70.x86_64", "3WS:cups-1:1.1.17-13.3.70.i386", "3WS:cups-1:1.1.17-13.3.70.ia64", "3WS:cups-1:1.1.17-13.3.70.ppc", "3WS:cups-1:1.1.17-13.3.70.s390", "3WS:cups-1:1.1.17-13.3.70.s390x", "3WS:cups-1:1.1.17-13.3.70.src", "3WS:cups-1:1.1.17-13.3.70.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3WS:cups-devel-1:1.1.17-13.3.70.i386", "3WS:cups-devel-1:1.1.17-13.3.70.ia64", "3WS:cups-devel-1:1.1.17-13.3.70.ppc", "3WS:cups-devel-1:1.1.17-13.3.70.s390", "3WS:cups-devel-1:1.1.17-13.3.70.s390x", "3WS:cups-devel-1:1.1.17-13.3.70.x86_64", "3WS:cups-libs-1:1.1.17-13.3.70.i386", "3WS:cups-libs-1:1.1.17-13.3.70.ia64", "3WS:cups-libs-1:1.1.17-13.3.70.ppc", "3WS:cups-libs-1:1.1.17-13.3.70.ppc64", "3WS:cups-libs-1:1.1.17-13.3.70.s390", "3WS:cups-libs-1:1.1.17-13.3.70.s390x", "3WS:cups-libs-1:1.1.17-13.3.70.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0754" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:cups-1:1.1.17-13.3.70.i386", "3AS:cups-1:1.1.17-13.3.70.ia64", "3AS:cups-1:1.1.17-13.3.70.ppc", "3AS:cups-1:1.1.17-13.3.70.s390", "3AS:cups-1:1.1.17-13.3.70.s390x", "3AS:cups-1:1.1.17-13.3.70.src", "3AS:cups-1:1.1.17-13.3.70.x86_64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3AS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3AS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3AS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3AS:cups-devel-1:1.1.17-13.3.70.i386", "3AS:cups-devel-1:1.1.17-13.3.70.ia64", "3AS:cups-devel-1:1.1.17-13.3.70.ppc", "3AS:cups-devel-1:1.1.17-13.3.70.s390", "3AS:cups-devel-1:1.1.17-13.3.70.s390x", "3AS:cups-devel-1:1.1.17-13.3.70.x86_64", "3AS:cups-libs-1:1.1.17-13.3.70.i386", "3AS:cups-libs-1:1.1.17-13.3.70.ia64", "3AS:cups-libs-1:1.1.17-13.3.70.ppc", "3AS:cups-libs-1:1.1.17-13.3.70.ppc64", "3AS:cups-libs-1:1.1.17-13.3.70.s390", "3AS:cups-libs-1:1.1.17-13.3.70.s390x", "3AS:cups-libs-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-1:1.1.17-13.3.70.i386", "3Desktop:cups-1:1.1.17-13.3.70.ia64", "3Desktop:cups-1:1.1.17-13.3.70.ppc", "3Desktop:cups-1:1.1.17-13.3.70.s390", "3Desktop:cups-1:1.1.17-13.3.70.s390x", "3Desktop:cups-1:1.1.17-13.3.70.src", "3Desktop:cups-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.i386", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3Desktop:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-devel-1:1.1.17-13.3.70.i386", "3Desktop:cups-devel-1:1.1.17-13.3.70.ia64", "3Desktop:cups-devel-1:1.1.17-13.3.70.ppc", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390", "3Desktop:cups-devel-1:1.1.17-13.3.70.s390x", "3Desktop:cups-devel-1:1.1.17-13.3.70.x86_64", "3Desktop:cups-libs-1:1.1.17-13.3.70.i386", "3Desktop:cups-libs-1:1.1.17-13.3.70.ia64", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc", "3Desktop:cups-libs-1:1.1.17-13.3.70.ppc64", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390", "3Desktop:cups-libs-1:1.1.17-13.3.70.s390x", "3Desktop:cups-libs-1:1.1.17-13.3.70.x86_64", "3ES:cups-1:1.1.17-13.3.70.i386", "3ES:cups-1:1.1.17-13.3.70.ia64", "3ES:cups-1:1.1.17-13.3.70.ppc", "3ES:cups-1:1.1.17-13.3.70.s390", "3ES:cups-1:1.1.17-13.3.70.s390x", "3ES:cups-1:1.1.17-13.3.70.src", "3ES:cups-1:1.1.17-13.3.70.x86_64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.i386", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3ES:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390", "3ES:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3ES:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3ES:cups-devel-1:1.1.17-13.3.70.i386", "3ES:cups-devel-1:1.1.17-13.3.70.ia64", "3ES:cups-devel-1:1.1.17-13.3.70.ppc", "3ES:cups-devel-1:1.1.17-13.3.70.s390", "3ES:cups-devel-1:1.1.17-13.3.70.s390x", "3ES:cups-devel-1:1.1.17-13.3.70.x86_64", "3ES:cups-libs-1:1.1.17-13.3.70.i386", "3ES:cups-libs-1:1.1.17-13.3.70.ia64", "3ES:cups-libs-1:1.1.17-13.3.70.ppc", "3ES:cups-libs-1:1.1.17-13.3.70.ppc64", "3ES:cups-libs-1:1.1.17-13.3.70.s390", "3ES:cups-libs-1:1.1.17-13.3.70.s390x", "3ES:cups-libs-1:1.1.17-13.3.70.x86_64", "3WS:cups-1:1.1.17-13.3.70.i386", "3WS:cups-1:1.1.17-13.3.70.ia64", "3WS:cups-1:1.1.17-13.3.70.ppc", "3WS:cups-1:1.1.17-13.3.70.s390", "3WS:cups-1:1.1.17-13.3.70.s390x", "3WS:cups-1:1.1.17-13.3.70.src", "3WS:cups-1:1.1.17-13.3.70.x86_64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.i386", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ia64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc", "3WS:cups-debuginfo-1:1.1.17-13.3.70.ppc64", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390", "3WS:cups-debuginfo-1:1.1.17-13.3.70.s390x", "3WS:cups-debuginfo-1:1.1.17-13.3.70.x86_64", "3WS:cups-devel-1:1.1.17-13.3.70.i386", "3WS:cups-devel-1:1.1.17-13.3.70.ia64", "3WS:cups-devel-1:1.1.17-13.3.70.ppc", "3WS:cups-devel-1:1.1.17-13.3.70.s390", "3WS:cups-devel-1:1.1.17-13.3.70.s390x", "3WS:cups-devel-1:1.1.17-13.3.70.x86_64", "3WS:cups-libs-1:1.1.17-13.3.70.i386", "3WS:cups-libs-1:1.1.17-13.3.70.ia64", "3WS:cups-libs-1:1.1.17-13.3.70.ppc", "3WS:cups-libs-1:1.1.17-13.3.70.ppc64", "3WS:cups-libs-1:1.1.17-13.3.70.s390", "3WS:cups-libs-1:1.1.17-13.3.70.s390x", "3WS:cups-libs-1:1.1.17-13.3.70.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" } ] }
rhsa-2010_0749
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated poppler packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Poppler is a Portable Document Format (PDF) rendering library, used by\napplications such as Evince.\n\nAn uninitialized pointer use flaw was discovered in poppler. An attacker\ncould create a malicious PDF file that, when opened, would cause\napplications that use poppler (such as Evince) to crash or, potentially,\nexecute arbitrary code. (CVE-2010-3702)\n\nAn array index error was found in the way poppler parsed PostScript Type 1\nfonts embedded in PDF documents. An attacker could create a malicious PDF\nfile that, when opened, would cause applications that use poppler (such as\nEvince) to crash or, potentially, execute arbitrary code. (CVE-2010-3704)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0749", "url": "https://access.redhat.com/errata/RHSA-2010:0749" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0749.json" } ], "title": "Red Hat Security Advisory: poppler security update", "tracking": { "current_release_date": "2024-11-22T03:44:34+00:00", "generator": { "date": "2024-11-22T03:44:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0749", "initial_release_date": "2010-10-07T15:02:00+00:00", "revision_history": [ { "date": "2010-10-07T15:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T11:05:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "product": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "product_id": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.4.el5_5.14?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=i386" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=i386" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.i386", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.i386", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=i386" } } }, { "category": "product_version", "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "product": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "product_id": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.4.el5_5.14?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.src", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.src", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "product": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "product_id": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.4.el5_5.14?arch=ia64" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=ia64" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=ia64" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "product": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "product_id": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.4.el5_5.14?arch=ppc" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=ppc" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=ppc" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "product": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "product_id": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.5.4-4.4.el5_5.14?arch=s390x" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=s390x" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=s390x" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "product": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "product_id": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.5.4-4.4.el5_5.14?arch=s390" } } }, { "category": "product_version", "name": "poppler-0:0.5.4-4.4.el5_5.14.s390", "product": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390", "product_id": "poppler-0:0.5.4-4.4.el5_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.5.4-4.4.el5_5.14?arch=s390" } } }, { "category": "product_version", "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "product": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "product_id": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.5.4-4.4.el5_5.14?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.src" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.src" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" }, "product_reference": "poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:02:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0749" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:02:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0749" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client-Workstation:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client-Workstation:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-0:0.5.4-4.4.el5_5.14.src", "5Client:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Client:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-0:0.5.4-4.4.el5_5.14.src", "5Server:poppler-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-debuginfo-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.ppc64", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-devel-0:0.5.4-4.4.el5_5.14.x86_64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.i386", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ia64", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.ppc", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.s390x", "5Server:poppler-utils-0:0.5.4-4.4.el5_5.14.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" } ] }
rhsa-2010_0859
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated poppler packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Poppler is a Portable Document Format (PDF) rendering library, used by\napplications such as Evince.\n\nTwo uninitialized pointer use flaws were discovered in poppler. An attacker\ncould create a malicious PDF file that, when opened, would cause\napplications that use poppler (such as Evince) to crash or, potentially,\nexecute arbitrary code. (CVE-2010-3702, CVE-2010-3703)\n\nAn array index error was found in the way poppler parsed PostScript Type 1\nfonts embedded in PDF documents. An attacker could create a malicious PDF\nfile that, when opened, would cause applications that use poppler (such as\nEvince) to crash or, potentially, execute arbitrary code. (CVE-2010-3704)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0859", "url": "https://access.redhat.com/errata/RHSA-2010:0859" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "639356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0859.json" } ], "title": "Red Hat Security Advisory: poppler security update", "tracking": { "current_release_date": "2024-11-22T03:45:02+00:00", "generator": { "date": "2024-11-22T03:45:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0859", "initial_release_date": "2010-11-10T19:00:00+00:00", "revision_history": [ { "date": "2010-11-10T19:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-09T13:14:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:45:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=i686" } } }, { "category": "product_version", "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "product": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "product_id": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.12.4-3.el6_0.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.12.4-3.el6_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.ppc64", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64", "product_id": "poppler-0:0.12.4-3.el6_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=ppc" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.ppc", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc", "product_id": "poppler-0:0.12.4-3.el6_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-utils@0.12.4-3.el6_0.1?arch=s390x" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.s390x", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x", "product_id": "poppler-0:0.12.4-3.el6_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4-devel@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib-devel@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-debuginfo@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-devel@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt4@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-qt-devel@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler-glib@0.12.4-3.el6_0.1?arch=s390" } } }, { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.s390", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.s390", "product_id": "poppler-0:0.12.4-3.el6_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "poppler-0:0.12.4-3.el6_0.1.src", "product": { "name": "poppler-0:0.12.4-3.el6_0.1.src", "product_id": "poppler-0:0.12.4-3.el6_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/poppler@0.12.4-3.el6_0.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.src" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" }, "product_reference": "poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0859" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3703", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639356" } ], "notes": [ { "category": "description", "text": "The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "poppler: use of initialized pointer in PostScriptFunction", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3703" }, { "category": "external", "summary": "RHBZ#639356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639356" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3703", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3703" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0859" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "poppler: use of initialized pointer in PostScriptFunction" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0859" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Client-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-0:0.12.4-3.el6_0.1.src", "6Client:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Client:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.src", "6ComputeNode:poppler-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6ComputeNode:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Server-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-0:0.12.4-3.el6_0.1.src", "6Server:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Server:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation-optional:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation-optional:poppler-utils-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-0:0.12.4-3.el6_0.1.src", "6Workstation:poppler-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-debuginfo-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-glib-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-qt4-devel-0:0.12.4-3.el6_0.1.x86_64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.i686", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.ppc64", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.s390x", "6Workstation:poppler-utils-0:0.12.4-3.el6_0.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" } ] }
rhsa-2010_0752
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated gpdf package that fixes two security issues is now available for\nRed Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "GPdf is a viewer for Portable Document Format (PDF) files.\n\nAn uninitialized pointer use flaw was discovered in GPdf. An attacker could\ncreate a malicious PDF file that, when opened, would cause GPdf to crash\nor, potentially, execute arbitrary code. (CVE-2010-3702)\n\nAn array index error was found in the way GPdf parsed PostScript Type 1\nfonts embedded in PDF documents. An attacker could create a malicious PDF\nfile that, when opened, would cause GPdf to crash or, potentially, execute\narbitrary code. (CVE-2010-3704)\n\nUsers are advised to upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0752", "url": "https://access.redhat.com/errata/RHSA-2010:0752" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0752.json" } ], "title": "Red Hat Security Advisory: gpdf security update", "tracking": { "current_release_date": "2024-11-22T03:44:45+00:00", "generator": { "date": "2024-11-22T03:44:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0752", "initial_release_date": "2010-10-07T15:27:00+00:00", "revision_history": [ { "date": "2010-10-07T15:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T11:31:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=ia64" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=i386" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=ppc" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=s390x" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "product": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "product_id": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf@2.8.2-7.7.2.el4_8.7?arch=s390" } } }, { "category": "product_version", "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "product": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "product_id": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gpdf-debuginfo@2.8.2-7.7.2.el4_8.7?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" }, "product_reference": "gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0752" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:27:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0752" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4AS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4AS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4Desktop:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4Desktop:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4ES:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4ES:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.src", "4WS:gpdf-0:2.8.2-7.7.2.el4_8.7.x86_64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.i386", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ia64", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.ppc", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.s390x", "4WS:gpdf-debuginfo-0:2.8.2-7.7.2.el4_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" } ] }
rhsa-2012_1201
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tetex packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "teTeX is an implementation of TeX. TeX takes a text file and a set of\nformatting commands as input, and creates a typesetter-independent DeVice\nIndependent (DVI) file as output.\n\nteTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1\nfonts. The following issues affect t1lib code:\n\nTwo heap-based buffer overflow flaws were found in the way t1lib processed\nAdobe Font Metrics (AFM) files. If a specially-crafted font file was opened\nby teTeX, it could cause teTeX to crash or, potentially, execute arbitrary\ncode with the privileges of the user running teTeX. (CVE-2010-2642,\nCVE-2011-0433)\n\nAn invalid pointer dereference flaw was found in t1lib. A specially-crafted\nfont file could, when opened, cause teTeX to crash or, potentially, execute\narbitrary code with the privileges of the user running teTeX.\n(CVE-2011-0764)\n\nA use-after-free flaw was found in t1lib. A specially-crafted font file\ncould, when opened, cause teTeX to crash or, potentially, execute arbitrary\ncode with the privileges of the user running teTeX. (CVE-2011-1553)\n\nAn off-by-one flaw was found in t1lib. A specially-crafted font file could,\nwhen opened, cause teTeX to crash or, potentially, execute arbitrary code\nwith the privileges of the user running teTeX. (CVE-2011-1554)\n\nAn out-of-bounds memory read flaw was found in t1lib. A specially-crafted\nfont file could, when opened, cause teTeX to crash. (CVE-2011-1552)\n\nteTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)\nfile viewer, to allow adding images in PDF format to the generated PDF\ndocuments. The following issues affect Xpdf code:\n\nAn uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was\nused to process a TeX document referencing a specially-crafted PDF file, it\ncould cause pdflatex to crash or, potentially, execute arbitrary code with\nthe privileges of the user running pdflatex. (CVE-2010-3702)\n\nAn array index error was found in the way Xpdf parsed PostScript Type 1\nfonts embedded in PDF documents. If pdflatex was used to process a TeX\ndocument referencing a specially-crafted PDF file, it could cause pdflatex\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running pdflatex. (CVE-2010-3704)\n\nRed Hat would like to thank the Evince development team for reporting\nCVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the\noriginal reporter of CVE-2010-2642.\n\nAll users of tetex are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1201", "url": "https://access.redhat.com/errata/RHSA-2012:1201" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "666318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318" }, { "category": "external", "summary": "679732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679732" }, { "category": "external", "summary": "692853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692853" }, { "category": "external", "summary": "692854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692854" }, { "category": "external", "summary": "692856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692856" }, { "category": "external", "summary": "692909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692909" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1201.json" } ], "title": "Red Hat Security Advisory: tetex security update", "tracking": { "current_release_date": "2024-11-22T03:59:45+00:00", "generator": { "date": "2024-11-22T03:59:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1201", "initial_release_date": "2012-08-23T14:53:00+00:00", "revision_history": [ { "date": "2012-08-23T14:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-08-23T14:55:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:59:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.src", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.src", "product_id": "tetex-0:3.0-33.15.el5_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-doc@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.15.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "product": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "product_id": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@3.0-33.15.el5_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-afm-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-afm-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-doc-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-doc-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-doc@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-dvips-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-dvips-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-fonts-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-fonts-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.15.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "tetex-latex-0:3.0-33.15.el5_8.1.i386", "product": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.i386", "product_id": "tetex-latex-0:3.0-33.15.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@3.0-33.15.el5_8.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-afm-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-afm-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-doc-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-doc-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-doc@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.15.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "tetex-latex-0:3.0-33.15.el5_8.1.ppc", "product": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ppc", "product_id": "tetex-latex-0:3.0-33.15.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@3.0-33.15.el5_8.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-afm-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-afm-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-doc-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-doc-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-doc@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.15.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "tetex-latex-0:3.0-33.15.el5_8.1.s390x", "product": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.s390x", "product_id": "tetex-latex-0:3.0-33.15.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@3.0-33.15.el5_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tetex-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-afm-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-afm-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-afm@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-xdvi@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-doc-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-doc-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-doc@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-debuginfo@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-dvips@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-fonts@3.0-33.15.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "tetex-latex-0:3.0-33.15.el5_8.1.ia64", "product": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ia64", "product_id": "tetex-latex-0:3.0-33.15.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tetex-latex@3.0-33.15.el5_8.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" }, "product_reference": "tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Evince development team" ] }, { "names": [ "Jon Larimer" ], "organization": "IBM X-Force", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-2642", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2010-12-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "666318" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: Heap based buffer overflow in DVI file AFM font parser", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of evince as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2642" }, { "category": "external", "summary": "RHBZ#666318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2642", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2642" } ], "release_date": "2011-01-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "t1lib: Heap based buffer overflow in DVI file AFM font parser" }, { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" }, { "cve": "CVE-2011-0433", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2011-02-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "679732" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: Heap-based buffer overflow DVI file AFM font parser", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue did not affect the versions of evince as shipped with Red Hat Enterprise Linux 5 and 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0433" }, { "category": "external", "summary": "RHBZ#679732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0433" } ], "release_date": "2011-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "t1lib: Heap-based buffer overflow DVI file AFM font parser" }, { "cve": "CVE-2011-0764", "discovery_date": "2011-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "692909" } ], "notes": [ { "category": "description", "text": "t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: Invalid pointer dereference via crafted Type 1 font", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0764" }, { "category": "external", "summary": "RHBZ#692909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0764", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0764" } ], "release_date": "2011-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "t1lib: Invalid pointer dereference via crafted Type 1 font" }, { "cve": "CVE-2011-1552", "discovery_date": "2011-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "692853" } ], "notes": [ { "category": "description", "text": "t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: invalid read crash via crafted Type 1 font", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1552" }, { "category": "external", "summary": "RHBZ#692853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692853" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1552" } ], "release_date": "2011-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "t1lib: invalid read crash via crafted Type 1 font" }, { "cve": "CVE-2011-1553", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2011-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "692854" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: Use-after-free via crafted Type 1 font", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1553" }, { "category": "external", "summary": "RHBZ#692854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1553" } ], "release_date": "2011-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "t1lib: Use-after-free via crafted Type 1 font" }, { "cve": "CVE-2011-1554", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2011-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "692856" } ], "notes": [ { "category": "description", "text": "Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.", "title": "Vulnerability description" }, { "category": "summary", "text": "t1lib: Off-by-one via crafted Type 1 font", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1554" }, { "category": "external", "summary": "RHBZ#692856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=692856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1554" } ], "release_date": "2011-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-08-23T14:53:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Client-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Client-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.src", "5Server-5.8.Z:tetex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-afm-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-debuginfo-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-doc-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-dvips-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-fonts-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-latex-0:3.0-33.15.el5_8.1.x86_64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.i386", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ia64", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.ppc", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.s390x", "5Server-5.8.Z:tetex-xdvi-0:3.0-33.15.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "t1lib: Off-by-one via crafted Type 1 font" } ] }
rhsa-2010_0755
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX operating systems. The CUPS \"pdftops\" filter converts Portable\nDocument Format (PDF) files to PostScript.\n\nMultiple flaws were discovered in the CUPS \"pdftops\" filter. An attacker\ncould create a malicious PDF file that, when printed, would cause \"pdftops\"\nto crash or, potentially, execute arbitrary code as the \"lp\" user.\n(CVE-2010-3702, CVE-2009-3609)\n\nUsers of cups are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing this\nupdate, the cupsd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0755", "url": "https://access.redhat.com/errata/RHSA-2010:0755" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "526893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0755.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T03:44:58+00:00", "generator": { "date": "2024-11-22T03:44:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0755", "initial_release_date": "2010-10-07T17:45:00+00:00", "revision_history": [ { "date": "2010-10-07T17:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T13:48:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_id": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.32.el4_8.10?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.32.el4_8.10?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_id": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.32.el4_8.10?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_id": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.32.el4_8.10?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" }, "product_reference": "cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3609", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "526893" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf/poppler: ImageStream:: ImageStream integer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3609" }, { "category": "external", "summary": "RHBZ#526893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=526893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3609", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3609" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3609", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3609" } ], "release_date": "2009-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T17:45:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0755" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "xpdf/poppler: ImageStream:: ImageStream integer overflow" }, { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T17:45:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0755" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4AS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4AS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4Desktop:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4Desktop:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4ES:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4ES:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.src", "4WS:cups-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-devel-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.i386", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ia64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.ppc64", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.s390x", "4WS:cups-libs-1:1.1.22-0.rc1.9.32.el4_8.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" } ] }
rhsa-2010_0753
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kdegraphics packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kdegraphics packages contain applications for the K Desktop\nEnvironment, including KPDF, a viewer for Portable Document Format (PDF)\nfiles.\n\nAn uninitialized pointer use flaw was discovered in KPDF. An attacker could\ncreate a malicious PDF file that, when opened, would cause KPDF to crash\nor, potentially, execute arbitrary code. (CVE-2010-3702)\n\nAn array index error was found in the way KPDF parsed PostScript Type 1\nfonts embedded in PDF documents. An attacker could create a malicious PDF\nfile that, when opened, would cause KPDF to crash or, potentially, execute\narbitrary code. (CVE-2010-3704)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0753", "url": "https://access.redhat.com/errata/RHSA-2010:0753" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0753.json" } ], "title": "Red Hat Security Advisory: kdegraphics security update", "tracking": { "current_release_date": "2024-11-22T03:44:50+00:00", "generator": { "date": "2024-11-22T03:44:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0753", "initial_release_date": "2010-10-07T15:48:00+00:00", "revision_history": [ { "date": "2010-10-07T15:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T11:52:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_productivity:5" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=ia64\u0026epoch=7" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "product": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "product_id": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-17.el5_5.1?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "product": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "product_id": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-17.el5_5.1?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "product": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "product_id": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.5.4-17.el5_5.1?arch=x86_64\u0026epoch=7" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "product": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "product_id": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-17.el5_5.1?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "product": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "product_id": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-17.el5_5.1?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "product": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "product_id": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.5.4-17.el5_5.1?arch=i386\u0026epoch=7" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.src", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.src", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=src\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.5.4-17.el5_5.1.src", "product": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.src", "product_id": "kdegraphics-7:3.5.4-17.el5_5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.5.4-17.el5_5.1?arch=src\u0026epoch=7" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=ppc\u0026epoch=7" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=s390x\u0026epoch=7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "product": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "product_id": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.3.1-18.el4_8.1?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "product": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "product_id": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics@3.3.1-18.el4_8.1?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "product": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "product_id": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kdegraphics-devel@3.3.1-18.el4_8.1?arch=s390\u0026epoch=7" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.src", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "relates_to_product_reference": "5Server-DPAS" }, { "category": "default_component_of", "full_product_name": { "name": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)", "product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" }, "product_reference": "kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "relates_to_product_reference": "5Server-DPAS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0753" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0753" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4AS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4AS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.src", "4Desktop:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4Desktop:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.src", "4ES:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4ES:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.src", "4WS:kdegraphics-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-debuginfo-7:3.3.1-18.el4_8.1.x86_64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.i386", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ia64", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.ppc", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.s390x", "4WS:kdegraphics-devel-7:3.3.1-18.el4_8.1.x86_64", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client-Workstation:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client-Workstation:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Client:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Client:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.src", "5Server-DPAS:kdegraphics-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-17.el5_5.1.x86_64", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.i386", "5Server-DPAS:kdegraphics-devel-7:3.5.4-17.el5_5.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" } ] }
rhsa-2010_0751
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated xpdf package that fixes two security issues is now available for\nRed Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Xpdf is an X Window System based viewer for Portable Document Format (PDF)\nfiles.\n\nAn uninitialized pointer use flaw was discovered in Xpdf. An attacker could\ncreate a malicious PDF file that, when opened, would cause Xpdf to crash\nor, potentially, execute arbitrary code. (CVE-2010-3702)\n\nAn array index error was found in the way Xpdf parsed PostScript Type 1\nfonts embedded in PDF documents. An attacker could create a malicious PDF\nfile that, when opened, would cause Xpdf to crash or, potentially, execute\narbitrary code. (CVE-2010-3704)\n\nUsers are advised to upgrade to this updated package, which contains\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0751", "url": "https://access.redhat.com/errata/RHSA-2010:0751" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0751.json" } ], "title": "Red Hat Security Advisory: xpdf security update", "tracking": { "current_release_date": "2024-11-22T03:44:42+00:00", "generator": { "date": "2024-11-22T03:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0751", "initial_release_date": "2010-10-07T15:23:00+00:00", "revision_history": [ { "date": "2010-10-07T15:23:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T11:26:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.ia64", "product": { "name": "xpdf-1:3.00-24.el4_8.1.ia64", "product_id": "xpdf-1:3.00-24.el4_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.x86_64", "product": { "name": "xpdf-1:3.00-24.el4_8.1.x86_64", "product_id": "xpdf-1:3.00-24.el4_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.i386", "product": { "name": "xpdf-1:3.00-24.el4_8.1.i386", "product_id": "xpdf-1:3.00-24.el4_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.src", "product": { "name": "xpdf-1:3.00-24.el4_8.1.src", "product_id": "xpdf-1:3.00-24.el4_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.ppc", "product": { "name": "xpdf-1:3.00-24.el4_8.1.ppc", "product_id": "xpdf-1:3.00-24.el4_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.s390x", "product": { "name": "xpdf-1:3.00-24.el4_8.1.s390x", "product_id": "xpdf-1:3.00-24.el4_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "product": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "product_id": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@3.00-24.el4_8.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:3.00-24.el4_8.1.s390", "product": { "name": "xpdf-1:3.00-24.el4_8.1.s390", "product_id": "xpdf-1:3.00-24.el4_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@3.00-24.el4_8.1?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.src" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.src" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.src" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.src" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" }, "product_reference": "xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0751" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" }, { "cve": "CVE-2010-3704", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638960" } ], "notes": [ { "category": "description", "text": "The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: array indexing error in FoFiType1::parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3704" }, { "category": "external", "summary": "RHBZ#638960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3704", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3704" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:23:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0751" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS:xpdf-1:3.00-24.el4_8.1.i386", "4AS:xpdf-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-1:3.00-24.el4_8.1.s390", "4AS:xpdf-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-1:3.00-24.el4_8.1.src", "4AS:xpdf-1:3.00-24.el4_8.1.x86_64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4AS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-1:3.00-24.el4_8.1.src", "4Desktop:xpdf-1:3.00-24.el4_8.1.x86_64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4Desktop:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-1:3.00-24.el4_8.1.i386", "4ES:xpdf-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-1:3.00-24.el4_8.1.s390", "4ES:xpdf-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-1:3.00-24.el4_8.1.src", "4ES:xpdf-1:3.00-24.el4_8.1.x86_64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4ES:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-1:3.00-24.el4_8.1.i386", "4WS:xpdf-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-1:3.00-24.el4_8.1.s390", "4WS:xpdf-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-1:3.00-24.el4_8.1.src", "4WS:xpdf-1:3.00-24.el4_8.1.x86_64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.i386", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ia64", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.ppc", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.s390x", "4WS:xpdf-debuginfo-1:3.00-24.el4_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: array indexing error in FoFiType1::parse()" } ] }
rhsa-2010_0750
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated xpdf package that fixes one security issue is now available for\nRed Hat Enterprise Linux 3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Xpdf is an X Window System based viewer for Portable Document Format (PDF)\nfiles.\n\nAn uninitialized pointer use flaw was discovered in Xpdf. An attacker could\ncreate a malicious PDF file that, when opened, would cause Xpdf to crash\nor, potentially, execute arbitrary code. (CVE-2010-3702)\n\nUsers are advised to upgrade to this updated package, which contains a\nbackported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0750", "url": "https://access.redhat.com/errata/RHSA-2010:0750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0750.json" } ], "title": "Red Hat Security Advisory: xpdf security update", "tracking": { "current_release_date": "2024-11-22T03:44:37+00:00", "generator": { "date": "2024-11-22T03:44:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0750", "initial_release_date": "2010-10-07T15:09:00+00:00", "revision_history": [ { "date": "2010-10-07T15:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T11:10:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:44:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.ia64", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.ia64", "product_id": "xpdf-debuginfo-1:2.02-19.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.ia64", "product": { "name": "xpdf-1:2.02-19.el3.ia64", "product_id": "xpdf-1:2.02-19.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "product_id": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.x86_64", "product": { "name": "xpdf-1:2.02-19.el3.x86_64", "product_id": "xpdf-1:2.02-19.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.i386", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.i386", "product_id": "xpdf-debuginfo-1:2.02-19.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.i386", "product": { "name": "xpdf-1:2.02-19.el3.i386", "product_id": "xpdf-1:2.02-19.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xpdf-1:2.02-19.el3.src", "product": { "name": "xpdf-1:2.02-19.el3.src", "product_id": "xpdf-1:2.02-19.el3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.ppc", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.ppc", "product_id": "xpdf-debuginfo-1:2.02-19.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.ppc", "product": { "name": "xpdf-1:2.02-19.el3.ppc", "product_id": "xpdf-1:2.02-19.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.s390x", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390x", "product_id": "xpdf-debuginfo-1:2.02-19.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.s390x", "product": { "name": "xpdf-1:2.02-19.el3.s390x", "product_id": "xpdf-1:2.02-19.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xpdf-debuginfo-1:2.02-19.el3.s390", "product": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390", "product_id": "xpdf-debuginfo-1:2.02-19.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf-debuginfo@2.02-19.el3?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "xpdf-1:2.02-19.el3.s390", "product": { "name": "xpdf-1:2.02-19.el3.s390", "product_id": "xpdf-1:2.02-19.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/xpdf@2.02-19.el3?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.i386" }, "product_reference": "xpdf-1:2.02-19.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-1:2.02-19.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-1:2.02-19.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.s390" }, "product_reference": "xpdf-1:2.02-19.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-1:2.02-19.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.src" }, "product_reference": "xpdf-1:2.02-19.el3.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.i386" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.s390" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:xpdf-debuginfo-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.i386" }, "product_reference": "xpdf-1:2.02-19.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-1:2.02-19.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-1:2.02-19.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.s390" }, "product_reference": "xpdf-1:2.02-19.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-1:2.02-19.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.src" }, "product_reference": "xpdf-1:2.02-19.el3.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.i386" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:xpdf-debuginfo-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.i386" }, "product_reference": "xpdf-1:2.02-19.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-1:2.02-19.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-1:2.02-19.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.s390" }, "product_reference": "xpdf-1:2.02-19.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-1:2.02-19.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.src" }, "product_reference": "xpdf-1:2.02-19.el3.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.i386" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.s390" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:xpdf-debuginfo-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.i386" }, "product_reference": "xpdf-1:2.02-19.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-1:2.02-19.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-1:2.02-19.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.s390" }, "product_reference": "xpdf-1:2.02-19.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-1:2.02-19.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.src" }, "product_reference": "xpdf-1:2.02-19.el3.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.i386" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.ia64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.ppc" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.s390" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.s390x" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "xpdf-debuginfo-1:2.02-19.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:xpdf-debuginfo-1:2.02-19.el3.x86_64" }, "product_reference": "xpdf-debuginfo-1:2.02-19.el3.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3702", "discovery_date": "2010-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "595245" } ], "notes": [ { "category": "description", "text": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "title": "Vulnerability description" }, { "category": "summary", "text": "xpdf: uninitialized Gfx::parser pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS:xpdf-1:2.02-19.el3.i386", "3AS:xpdf-1:2.02-19.el3.ia64", "3AS:xpdf-1:2.02-19.el3.ppc", "3AS:xpdf-1:2.02-19.el3.s390", "3AS:xpdf-1:2.02-19.el3.s390x", "3AS:xpdf-1:2.02-19.el3.src", "3AS:xpdf-1:2.02-19.el3.x86_64", "3AS:xpdf-debuginfo-1:2.02-19.el3.i386", "3AS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3AS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3AS:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3Desktop:xpdf-1:2.02-19.el3.i386", "3Desktop:xpdf-1:2.02-19.el3.ia64", "3Desktop:xpdf-1:2.02-19.el3.ppc", "3Desktop:xpdf-1:2.02-19.el3.s390", "3Desktop:xpdf-1:2.02-19.el3.s390x", "3Desktop:xpdf-1:2.02-19.el3.src", "3Desktop:xpdf-1:2.02-19.el3.x86_64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.i386", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ia64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ppc", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390x", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3ES:xpdf-1:2.02-19.el3.i386", "3ES:xpdf-1:2.02-19.el3.ia64", "3ES:xpdf-1:2.02-19.el3.ppc", "3ES:xpdf-1:2.02-19.el3.s390", "3ES:xpdf-1:2.02-19.el3.s390x", "3ES:xpdf-1:2.02-19.el3.src", "3ES:xpdf-1:2.02-19.el3.x86_64", "3ES:xpdf-debuginfo-1:2.02-19.el3.i386", "3ES:xpdf-debuginfo-1:2.02-19.el3.ia64", "3ES:xpdf-debuginfo-1:2.02-19.el3.ppc", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390x", "3ES:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3WS:xpdf-1:2.02-19.el3.i386", "3WS:xpdf-1:2.02-19.el3.ia64", "3WS:xpdf-1:2.02-19.el3.ppc", "3WS:xpdf-1:2.02-19.el3.s390", "3WS:xpdf-1:2.02-19.el3.s390x", "3WS:xpdf-1:2.02-19.el3.src", "3WS:xpdf-1:2.02-19.el3.x86_64", "3WS:xpdf-debuginfo-1:2.02-19.el3.i386", "3WS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3WS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3WS:xpdf-debuginfo-1:2.02-19.el3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3702" }, { "category": "external", "summary": "RHBZ#595245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3702", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3702" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" } ], "release_date": "2010-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-07T15:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS:xpdf-1:2.02-19.el3.i386", "3AS:xpdf-1:2.02-19.el3.ia64", "3AS:xpdf-1:2.02-19.el3.ppc", "3AS:xpdf-1:2.02-19.el3.s390", "3AS:xpdf-1:2.02-19.el3.s390x", "3AS:xpdf-1:2.02-19.el3.src", "3AS:xpdf-1:2.02-19.el3.x86_64", "3AS:xpdf-debuginfo-1:2.02-19.el3.i386", "3AS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3AS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3AS:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3Desktop:xpdf-1:2.02-19.el3.i386", "3Desktop:xpdf-1:2.02-19.el3.ia64", "3Desktop:xpdf-1:2.02-19.el3.ppc", "3Desktop:xpdf-1:2.02-19.el3.s390", "3Desktop:xpdf-1:2.02-19.el3.s390x", "3Desktop:xpdf-1:2.02-19.el3.src", "3Desktop:xpdf-1:2.02-19.el3.x86_64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.i386", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ia64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ppc", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390x", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3ES:xpdf-1:2.02-19.el3.i386", "3ES:xpdf-1:2.02-19.el3.ia64", "3ES:xpdf-1:2.02-19.el3.ppc", "3ES:xpdf-1:2.02-19.el3.s390", "3ES:xpdf-1:2.02-19.el3.s390x", "3ES:xpdf-1:2.02-19.el3.src", "3ES:xpdf-1:2.02-19.el3.x86_64", "3ES:xpdf-debuginfo-1:2.02-19.el3.i386", "3ES:xpdf-debuginfo-1:2.02-19.el3.ia64", "3ES:xpdf-debuginfo-1:2.02-19.el3.ppc", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390x", "3ES:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3WS:xpdf-1:2.02-19.el3.i386", "3WS:xpdf-1:2.02-19.el3.ia64", "3WS:xpdf-1:2.02-19.el3.ppc", "3WS:xpdf-1:2.02-19.el3.s390", "3WS:xpdf-1:2.02-19.el3.s390x", "3WS:xpdf-1:2.02-19.el3.src", "3WS:xpdf-1:2.02-19.el3.x86_64", "3WS:xpdf-debuginfo-1:2.02-19.el3.i386", "3WS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3WS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3WS:xpdf-debuginfo-1:2.02-19.el3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0750" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "3AS:xpdf-1:2.02-19.el3.i386", "3AS:xpdf-1:2.02-19.el3.ia64", "3AS:xpdf-1:2.02-19.el3.ppc", "3AS:xpdf-1:2.02-19.el3.s390", "3AS:xpdf-1:2.02-19.el3.s390x", "3AS:xpdf-1:2.02-19.el3.src", "3AS:xpdf-1:2.02-19.el3.x86_64", "3AS:xpdf-debuginfo-1:2.02-19.el3.i386", "3AS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3AS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390", "3AS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3AS:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3Desktop:xpdf-1:2.02-19.el3.i386", "3Desktop:xpdf-1:2.02-19.el3.ia64", "3Desktop:xpdf-1:2.02-19.el3.ppc", "3Desktop:xpdf-1:2.02-19.el3.s390", "3Desktop:xpdf-1:2.02-19.el3.s390x", "3Desktop:xpdf-1:2.02-19.el3.src", "3Desktop:xpdf-1:2.02-19.el3.x86_64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.i386", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ia64", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.ppc", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.s390x", "3Desktop:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3ES:xpdf-1:2.02-19.el3.i386", "3ES:xpdf-1:2.02-19.el3.ia64", "3ES:xpdf-1:2.02-19.el3.ppc", "3ES:xpdf-1:2.02-19.el3.s390", "3ES:xpdf-1:2.02-19.el3.s390x", "3ES:xpdf-1:2.02-19.el3.src", "3ES:xpdf-1:2.02-19.el3.x86_64", "3ES:xpdf-debuginfo-1:2.02-19.el3.i386", "3ES:xpdf-debuginfo-1:2.02-19.el3.ia64", "3ES:xpdf-debuginfo-1:2.02-19.el3.ppc", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390", "3ES:xpdf-debuginfo-1:2.02-19.el3.s390x", "3ES:xpdf-debuginfo-1:2.02-19.el3.x86_64", "3WS:xpdf-1:2.02-19.el3.i386", "3WS:xpdf-1:2.02-19.el3.ia64", "3WS:xpdf-1:2.02-19.el3.ppc", "3WS:xpdf-1:2.02-19.el3.s390", "3WS:xpdf-1:2.02-19.el3.s390x", "3WS:xpdf-1:2.02-19.el3.src", "3WS:xpdf-1:2.02-19.el3.x86_64", "3WS:xpdf-debuginfo-1:2.02-19.el3.i386", "3WS:xpdf-debuginfo-1:2.02-19.el3.ia64", "3WS:xpdf-debuginfo-1:2.02-19.el3.ppc", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390", "3WS:xpdf-debuginfo-1:2.02-19.el3.s390x", "3WS:xpdf-debuginfo-1:2.02-19.el3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xpdf: uninitialized Gfx::parser pointer dereference" } ] }
ghsa-89fq-mfqc-jvjp
Vulnerability from github
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
{ "affected": [], "aliases": [ "CVE-2010-3702" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-11-05T18:00:00Z", "severity": "HIGH" }, "details": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "id": "GHSA-89fq-mfqc-jvjp", "modified": "2022-05-17T19:48:14Z", "published": "2022-05-17T19:48:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3702" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "type": "WEB", "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/42141" }, { "type": "WEB", "url": "http://secunia.com/advisories/42357" }, { "type": "WEB", "url": "http://secunia.com/advisories/42397" }, { "type": "WEB", "url": "http://secunia.com/advisories/42691" }, { "type": "WEB", "url": "http://secunia.com/advisories/43079" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2119" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2135" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "type": "WEB", "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/43845" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0230" } ], "schema_version": "1.4.0", "severity": [] }
var-201011-0178
Vulnerability from variot
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference. Xpdf is prone to a vulnerability due to an array-indexing error. An attacker can exploit this issue by tricking an unsuspecting victim into opening a malicious PDF file with an affected application. Successful exploits will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704
Updated Packages:
Mandriva Linux 2010.0: f8eeb85b978e98a9bfffce7ab584e9df 2010.0/i586/libpoppler5-0.12.4-1.2mdv2010.0.i586.rpm 11b9dfe9e37261bec174c25aae9d71b4 2010.0/i586/libpoppler-devel-0.12.4-1.2mdv2010.0.i586.rpm b9af206162c906094204ed13a4620318 2010.0/i586/libpoppler-glib4-0.12.4-1.2mdv2010.0.i586.rpm eea6fc72a55f119c2fe7aef2c37400f6 2010.0/i586/libpoppler-glib-devel-0.12.4-1.2mdv2010.0.i586.rpm d83f8f81d2cbb11a3a12e0654d63cd11 2010.0/i586/libpoppler-qt2-0.12.4-1.2mdv2010.0.i586.rpm 8e1f7d0278a299b55e1b213f90462610 2010.0/i586/libpoppler-qt4-3-0.12.4-1.2mdv2010.0.i586.rpm 6f1505518bb6a42bd017f4ed00ed5f3f 2010.0/i586/libpoppler-qt4-devel-0.12.4-1.2mdv2010.0.i586.rpm 6bfceb4bbb5565f829c765e15d9f84f8 2010.0/i586/libpoppler-qt-devel-0.12.4-1.2mdv2010.0.i586.rpm 69b87e12827e20261bcac5c1a9f6cc47 2010.0/i586/poppler-0.12.4-1.2mdv2010.0.i586.rpm b395b580e189eac53cec4cdce2ceaeeb 2010.0/SRPMS/poppler-0.12.4-1.2mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64: 5ac922ba77b7e24852b032cb96d66dcc 2010.0/x86_64/lib64poppler5-0.12.4-1.2mdv2010.0.x86_64.rpm a35fdb10aaaeda661082eea969c8cb10 2010.0/x86_64/lib64poppler-devel-0.12.4-1.2mdv2010.0.x86_64.rpm be4e55287976d6d9f0bc8acdd41dc371 2010.0/x86_64/lib64poppler-glib4-0.12.4-1.2mdv2010.0.x86_64.rpm 2e63d0dff69e958f0b926cf6d0026c61 2010.0/x86_64/lib64poppler-glib-devel-0.12.4-1.2mdv2010.0.x86_64.rpm b50e39d108dc2458c252fbf365e2aaff 2010.0/x86_64/lib64poppler-qt2-0.12.4-1.2mdv2010.0.x86_64.rpm 7b249ff04f794fb6a8dc8b05564143e4 2010.0/x86_64/lib64poppler-qt4-3-0.12.4-1.2mdv2010.0.x86_64.rpm 121f80f800f144eb489f0cdce287e7ef 2010.0/x86_64/lib64poppler-qt4-devel-0.12.4-1.2mdv2010.0.x86_64.rpm fb7297fbbd3758eca663813932d822fe 2010.0/x86_64/lib64poppler-qt-devel-0.12.4-1.2mdv2010.0.x86_64.rpm 5fbd9b1cbd0c18cc7f5a77ee8c9421e8 2010.0/x86_64/poppler-0.12.4-1.2mdv2010.0.x86_64.rpm b395b580e189eac53cec4cdce2ceaeeb 2010.0/SRPMS/poppler-0.12.4-1.2mdv2010.0.src.rpm
Mandriva Linux 2010.1: 039272fbf964bf0cda8ee8be3f73d7f0 2010.1/i586/libpoppler5-0.12.4-2.1mdv2010.1.i586.rpm 4b8cd7ba4fcad0fdb13d498d9659353e 2010.1/i586/libpoppler-devel-0.12.4-2.1mdv2010.1.i586.rpm 0c8ecda02ad63275628fdf7dbb886d85 2010.1/i586/libpoppler-glib4-0.12.4-2.1mdv2010.1.i586.rpm a899985446082afaf7a552a9d093fa7b 2010.1/i586/libpoppler-glib-devel-0.12.4-2.1mdv2010.1.i586.rpm 98cc33b6085f8b5a3e450814217a87fc 2010.1/i586/libpoppler-qt2-0.12.4-2.1mdv2010.1.i586.rpm aca2798c969fe7e1ae41f8fda8c767bf 2010.1/i586/libpoppler-qt4-3-0.12.4-2.1mdv2010.1.i586.rpm 766c5b85413728af84378f56647f3d6e 2010.1/i586/libpoppler-qt4-devel-0.12.4-2.1mdv2010.1.i586.rpm e1af5e2dda8be30d3ac1e009ce856588 2010.1/i586/libpoppler-qt-devel-0.12.4-2.1mdv2010.1.i586.rpm e2060c17f1f8ece622fbcf94e50205d7 2010.1/i586/poppler-0.12.4-2.1mdv2010.1.i586.rpm a3495563ca96089190aef76b6c25df4d 2010.1/SRPMS/poppler-0.12.4-2.1mdv2010.1.src.rpm
Mandriva Linux 2010.1/X86_64: 142bdd508c9c62480b467b3aa74a6eb1 2010.1/x86_64/lib64poppler5-0.12.4-2.1mdv2010.1.x86_64.rpm 423f44b8802e838afbdd9be973bee11b 2010.1/x86_64/lib64poppler-devel-0.12.4-2.1mdv2010.1.x86_64.rpm 88b25a582c2bf185196e8d68b2567bd9 2010.1/x86_64/lib64poppler-glib4-0.12.4-2.1mdv2010.1.x86_64.rpm 5ea3f17b45cdddf438d4642348f0133d 2010.1/x86_64/lib64poppler-glib-devel-0.12.4-2.1mdv2010.1.x86_64.rpm 11e9facfbca3b5d916f480e5053614cd 2010.1/x86_64/lib64poppler-qt2-0.12.4-2.1mdv2010.1.x86_64.rpm 51f3818574979e270265d94947b863ff 2010.1/x86_64/lib64poppler-qt4-3-0.12.4-2.1mdv2010.1.x86_64.rpm d7c2b054dd96ac00eb7caf957d290cf6 2010.1/x86_64/lib64poppler-qt4-devel-0.12.4-2.1mdv2010.1.x86_64.rpm 9533bb591cd679ba8f880b23605e837a 2010.1/x86_64/lib64poppler-qt-devel-0.12.4-2.1mdv2010.1.x86_64.rpm a6fd550b90857f4cbfcd97213d5e7918 2010.1/x86_64/poppler-0.12.4-2.1mdv2010.1.x86_64.rpm a3495563ca96089190aef76b6c25df4d 2010.1/SRPMS/poppler-0.12.4-2.1mdv2010.1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFM3VkMmqjQ0CJFipgRAt1ZAKDMo9oWIQ/0cZWwYHte7+QQWtASZwCfTuRR Qp8m00pY+5aiMBWXOR3I64k= =VPTO -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected.
TITLE: Xpdf Two Vulnerabilities
SECUNIA ADVISORY ID: SA41709
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41709/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41709
RELEASE DATE: 2010-10-12
DISCUSS ADVISORY: http://secunia.com/advisories/41709/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/41709/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=41709
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Xpdf, which can potentially be exploited by malicious people to compromise a user's system.
For more information see vulnerabilities #1 and #2 in: SA41596
SOLUTION: Do not open files from untrusted sources.
PROVIDED AND/OR DISCOVERED BY: Reported in Poppler by Joel Voss, Leviathan Security Group.
ORIGINAL ADVISORY: https://rhn.redhat.com/errata/RHSA-2010-0751.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201402-17
http://security.gentoo.org/
Severity: Normal Title: Xpdf: User-assisted execution of arbitrary code Date: February 17, 2014 Bugs: #386271 ID: 201402-17
Synopsis
Multiple vulnerabilities in Xpdf could result in execution of arbitrary code.
Background
Xpdf is an X viewer for PDF files.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/xpdf <= 3.02-r4 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. Please review the CVE identifiers referenced below for details.
Impact
A context-dependent attacker could execute arbitrary code or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
Gentoo has discontinued support for Xpdf. We recommend that users unmerge Xpdf:
# emerge --unmerge "app-text/xpdf"
References
[ 1 ] CVE-2009-4035 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035 [ 2 ] CVE-2010-3702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702 [ 3 ] CVE-2010-3704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201402-17.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
For the stable distribution (lenny), these problems have been fixed in version 3.02-1.4+lenny3.
For the upcoming stable distribution (squeeze) and the unstable distribution (sid), these problems don't apply, since xpdf has been patched to use the Poppler PDF library.
Upgrade instructions
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-1005-1 October 19, 2010 poppler vulnerabilities CVE-2010-3702, CVE-2010-3703, CVE-2010-3704 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 9.04 Ubuntu 9.10 Ubuntu 10.04 LTS Ubuntu 10.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libpoppler1 0.5.1-0ubuntu7.8 libpoppler1-glib 0.5.1-0ubuntu7.8
Ubuntu 8.04 LTS: libpoppler-glib2 0.6.4-1ubuntu3.5 libpoppler2 0.6.4-1ubuntu3.5
Ubuntu 9.04: libpoppler-glib4 0.10.5-1ubuntu2.6 libpoppler4 0.10.5-1ubuntu2.6
Ubuntu 9.10: libpoppler-glib4 0.12.0-0ubuntu2.3 libpoppler5 0.12.0-0ubuntu2.3
Ubuntu 10.04 LTS: libpoppler-glib4 0.12.4-0ubuntu5.1 libpoppler5 0.12.4-0ubuntu5.1
Ubuntu 10.10: libpoppler-glib5 0.14.3-0ubuntu1.1 libpoppler7 0.14.3-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
Details follow:
It was discovered that poppler contained multiple security issues when parsing malformed PDF documents.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.diff.gz
Size/MD5: 27259 bedbca4c7d1fbb131e87ac7d01b9ccfb
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.dsc
Size/MD5: 2375 9242a34c31aec338034bad41ff0e04fb
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz
Size/MD5: 954930 a136cd731892f4570933034ba97c8704
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 729804 990c4697220246f06734ec985bf79805
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 58242 4e17049f4d461125928bd33eb905542e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 47402 2e1911778f8d114dc01570a16cc753fa
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 52998 4dc5f9471611f96ec0bfb5314a527d67
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 43618 37459b85fdf031fdba6e1b35ea116679
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 546536 7ad7ef20bd092f9007a0a4f2920d301d
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_amd64.deb
Size/MD5: 101316 389d8b7bf42dd291ae246bbe5306c66e
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 664928 8670a45be74a527aa2381c786d6f499c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 56038 20fa91b22991fbf8f2855d0019a30066
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 46100 aa511d2877d5a86ee35fb8760168e746
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 51888 e635377fcd0afcc86fb5665f12596940
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 43120 0a299604034207977e6549719e97c3bb
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 505126 546b78451a3db468d906a13c3e461755
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_i386.deb
Size/MD5: 93028 075e41dd3d3608e7e4a5f682d3ab0d45
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 769490 69fe73d00ba079febc5ada96e82cb518
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 60272 ef55f2b86d376cfc7f81786fa56f0852
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 47556 20725d1ceae67bd27b629bda23ea27aa
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 54288 f1652517075e0ea34c6b762e8e1ec6ba
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 44890 7ce2dad1bd9962aecd9184b74de80dbd
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 552776 7b30e7f41666d93aaa7d3a95537333d8
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_powerpc.deb
Size/MD5: 105656 6d4c33c8c30e18aba3e5248d19945312
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 690766 199896329398917fe8f2a37179d02a34
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 56618 d6fe358f5cdcbc02450e69db342ee8b3
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 46092 5d19384e2488912b2ba4d98ff39906b7
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 51360 9b6aaada69d2fd81edbf8a3f1e236256
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 42362 914f0dfd79b25858ad12ad20c4407905
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 518396 ccb5b4d7b6a3966174b55e82597d90b8
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_sparc.deb
Size/MD5: 93880 6343457c99d3fe9e95c65e7f11ed1688
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.diff.gz
Size/MD5: 22610 e40e61ff8f404dd8c570d7d9d37d3344
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.dsc
Size/MD5: 1832 5e30251249c773f2fdb94278bf11050c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4.orig.tar.gz
Size/MD5: 1294481 13d12ca4e349574cfbbcf4a9b2b3ae52
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 899230 8fce2b7acfae6b6397caf9caf140a031
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 110018 dfafa5b34781fe749705af443a32d855
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 54810 5febb6077ff4019f33ef36b39d05087b
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 46176 f53d822dbade16249befcf24f503c443
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 25520 85571978f17908b52fde4a635b1a411e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 146760 9ff80c2dbf2bb811e31e1b66caf6279c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 201282 909dc624c82bc3c89a0b46ee49fc080f
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 648816 9c4f1dbc90f19b95970d601d05ebf72b
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_amd64.deb
Size/MD5: 78984 ea5c07bc1f8cc794416c93e05b4f4815
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 839500 f428fc3b2317229955ebf3145bd8b1ef
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 102844 5abd270a2f436fd79d5fa021ed0a75a2
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 52354 58e6cec2618c530ae21ca02fb009da06
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 42614 9370944020717ba5be753fe28ab981d0
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 25050 57ac26b842693f33b609ea6d6ced073b
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 143622 9f476e4d71f8693f39e73e76c9a65d3c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 190086 b40f870abc3aa6f6b8203de269e88d93
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 623310 43c9e0e5063794de8b008a567dd48545
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_i386.deb
Size/MD5: 73692 d5434601a4e7ef66297888f349217a1f
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 859546 59e85a8660b8972ffac2b9964be303bd
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 103834 2dd93fcfeb085ad2d2ebbf2631b094e9
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 52614 bfa697640e43ddb7314d66f7107e021f
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 43048 f1173347bdf4b450a9058f558a0e98e0
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 24792 2f1a32e1c3062d9ff8ad2bac1a89a5e2
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 145068 e079cb3940740d3866454898c7a635ba
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 191294 c0083aef2f0adfc21064be2f95f6316d
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 637232 bff9ecff5a68a668e00a2c0bab55b290
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_lpia.deb
Size/MD5: 74708 14d03ac4f0abc79bb2b7696776db9362
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 956836 642c3332a4295161be0729b72f6ccfb0
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 115792 671359d71e699df8ef011ef9b1b97e13
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 58464 118f2e096f121fb43ad8a287335f5892
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 46142 60ec3d227164cb4f52531bf0d0d94a71
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 28862 cf22690c891eaf82c9587faff7e7aec1
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 152744 fef8f36a164ceb3a425882cc697d9cad
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 209554 7c20fafa41749c91709a2c925844cad1
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 683376 5c9e55ebefa5e5dfabbd72787bf5b7bb
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_powerpc.deb
Size/MD5: 94454 50f79c3f37ccade2e26ac5f01fedb367
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 859950 ca8b01d58970c27729fb9311f7706611
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 104158 a60feaf9f57f703ae37d4587071e10e3
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 51408 3a832dd5583a5ebdca67fb868b774f46
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 42008 563aa6cce06916284a5bbccc8f9a4a2a
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 23902 dbda45ef43ff352439a2595766a8725f
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 145340 fcacd993458d4e16e4104b1c2fef74b5
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 193258 872f6f3ef8af1a386100f929342c23f3
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 631572 31bc91916469b6fee1e4ed2411b98c70
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_sparc.deb
Size/MD5: 72984 85a3e42acdf1819c8fc07053cb9012c3
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.diff.gz
Size/MD5: 22658 46a4434de1013ad6a1aedd7f83f4638e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.dsc
Size/MD5: 2319 cb6568c37577a77805a323102daf8cbe
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5.orig.tar.gz
Size/MD5: 1516687 125f671a19707861132fb03e73b61184
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 1000762 2511c181edee11136cd95f2fd8f7df4e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 124320 8e44bb95aaf500ea3f5f2cfeda92c77b
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 64498 433f22fd427b85eda6c6f79c093c7bf4
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 51136 3fce9dd192f7cf72beb2a462b78a045f
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 26084 40b1eb43d7c31c344ee807f67b56405a
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 166096 856ebcf506dfe1e6f73a16d039683576
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 235030 001590442c32e9d44d12c708cb484a34
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 715688 100b06d8f1c178b74a72627c1293a99d
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 3191282 9fad2dc154e6816007978eecba272f98
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_amd64.deb
Size/MD5: 80310 e6f5e58168c6548ee953afc2f2e198e2
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 939116 1a637f61cc6980c737f0485fc2ee9d46
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 118186 be93a766d70095e2b904e8a1059c1ea9
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 61432 b48d904620036b494dae30f846757933
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 48108 502e462be767601fd4f37278ff6fb0c9
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 25400 0d97956139ca4df762ff50924775c7ee
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 164406 c48888d902bace1af6f9568bc7d11781
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 219842 642d8bf864daa53baa9aba14ef1d8e8d
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 687198 ebd3b55dd94130e8031fce6fdd9c2977
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 3106210 be7d517d3130e27b75b778b1fafab2c2
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_i386.deb
Size/MD5: 75150 842cb849ecdc92162f1ef0645a89694a
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 951712 5833f800109087edef20d0d2e043a2a0
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 118064 f415be637dbb5991ce0cf7d4bc62b9b7
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 61512 247589fb21e89512e10055a39cdef0c0
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 48234 53a1552904e2243babf5b4480f4e39d2
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 25090 fe55913c8f07a2d573d202669dd1697e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 164652 37ca1c8caa83a03a65f2d24d4f7576bb
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 220064 5d8c233389507dc10c6830ab35ab31e4
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 698034 6b6e1e71dc2b4d73ce5d91ab18ed1434
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 3141000 792164965ecec628891930c15056146e
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_lpia.deb
Size/MD5: 75852 566179c180af7420345a59aef66d20ab
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 1067816 72f7c6c253c7a0d6de9572a45b766bea
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 132060 05faca87e109c1c75a82a458b2d23949
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 69138 2c877d50106cacbfa82cb9e60e572e7e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 51250 377d0b6a2fb986aafde1ee9f8045e04a
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 28790 9a4a744f8bbaee83ab3e0d624425dda3
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 170364 ce061c2566a07dd3c159a23d66d829fc
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 239232 b223e0531752af48a78b9feb2964e77a
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 751112 72ec27c3cfa98ec9c51e1735b233d70a
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 3289146 731cdf54cada7da65a2a3c939df59f93
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_powerpc.deb
Size/MD5: 92846 b62d9487645a67d4c892c3671a75e05c
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 958890 6948353f591647da86e316845ec8f9eb
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 120824 6ff59a3bbd4a9b425ef23110a76c4298
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 61180 2cc5e6f027e76b607defdc9a797fea4d
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 47586 c343721df8aec6efa801c42368c65187
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 24302 829a6fd6cb43629453b0d03abb134c74
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 165794 e2baae9323c3dc1bfd4c7a5188b876a4
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 227060 24c905d2bf65312b9654f3a8c3ff1b85
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 699612 e891d015a5e9f4a06c62330ae13ad8ff
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 3054006 65d02dc72ebedeee044492a0d54a7c9b
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_sparc.deb
Size/MD5: 75462 14106f64edcc64399c73cecfffe82660
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.diff.gz
Size/MD5: 16162 e2f7027909f54a82d3b05a5dab49bfe3
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.dsc
Size/MD5: 2333 0ca7e3c51f46e811ab8b764d19735017
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0.orig.tar.gz
Size/MD5: 1595424 399b25d9d71ad22bc9a2a9281769c49c
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 1051980 811eb825ef2a4a35a2737c7cc8f7dc18
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 147620 0df853686d2bde4d3251e2034d4aaca4
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 75082 66a4118be485eca8c0d64bcb507d95fe
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 56040 9aa3e75a67f5b3325354e0cd0783b4eb
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 26016 ab04a30595e5e10a8ea324ce5429859d
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 169758 a0feabc74a20a921577bb14b328f4f08
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 246134 66b67de914b70e969cef45ad38be8350
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 758072 3759109d011266b2f989d6d4b9c700f8
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 3352576 018f3529b1b4b66eb8fce6446e151276
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_amd64.deb
Size/MD5: 84178 3242ad6a0e40ac5017b25f252026b4ec
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 989400 4c6f5530a2751fbef0c4cf2b91c0a450
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 140982 8b2732a5ee3087e754cfbc8a311508a9
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 72374 9dafd2e2f353b30269b61184d8a05a73
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 53740 92abc5198ae95accc2a9c04535a12e74
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 25630 9ed21683dc9ce42230357a75c9f8efaf
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 166244 5407024e0fbca9ca17cf31784689f530
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 231402 085ad28bb8f30fb81c922bdf98461f62
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 725946 56e85e5a60eded5dd71286df5afcddad
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 3273936 4900c20227ee15c570803e0a5ea2380e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_i386.deb
Size/MD5: 80140 8397685b99e33d2295945e01b5a9c5a9
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 1024116 82f69ec56049caaaa2e6d6ddfbcf38e9
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 145452 ca9c8d859dd2c259254c1015c8150e7c
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 73070 93faf777eb853626a8021a4fdf951ae0
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 53314 f04f80d8c690dd8eed9f2d8629b82ab6
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 24216 5597f9b407ed6e297dfb60495a926835
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 168690 d5f6fc3fd30c50549a0425684be4456f
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 244286 73acb1d168e1b946fc0ab87e52a98d2b
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 749218 e362ac899fed10132a24579c856392bf
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 3243524 b3809cb3b43f6c6fcbf78e5f195454b8
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_sparc.deb
Size/MD5: 80606 84e09ef47c3a62d374f7d72d077857f7
Updated packages for Ubuntu 10.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.diff.gz
Size/MD5: 36586 3c8f46489d270a6553c603f1bf42df61
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.dsc
Size/MD5: 2321 6309c218890373f2d2f3829083f1e14e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4.orig.tar.gz
Size/MD5: 1674400 4155346f9369b192569ce9184ff73e43
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 1057464 02cfbb58b185dce47f79752bc448ecfb
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 153226 6a1cd66dad1f036c916834a9bee5290e
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 79122 fc4779709ed8b692f9debc48054dcf66
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 56012 6c389ff1ec4144b526b34e3df0390361
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 26902 e4f305ff49b07e2d4266f3c23b737328
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 172296 6a277bb044e8bddf0b7211ef4f201e8a
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 252048 07a540e9727055ad6ea3af4805ca02f4
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 762152 b900a754d1f4fd137a984a5d9a428b49
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 3392098 40b5213d5c65333912cb2a6837cb8155
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_amd64.deb
Size/MD5: 84984 222e314966329a71370119194760f289
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 994314 0cf46cddcca262acb400301c6ccfadcf
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 146050 ecfd6621c0c8125575908fce67e87037
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 75926 9460e967f9ea99f6e52cea7b82794cf1
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 53792 094890d2058126fad34a2a9f1b74a9fe
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 26526 ae6f93323c82c1d452e81335025c4677
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 169754 b69d20dacb024e9412954289e62606e5
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 237416 79df3cbaef280ae078fe5d90d1efeca6
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 729896 ebd5b47847b7d4c2d6a7956d5f2b9c9c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 3308176 1901fd74a67d54354fc37140a3820651
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_i386.deb
Size/MD5: 80940 24c64a45a096f19bc5e29ac070570932
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 1139050 391b272517bddffbfecbbc91a43b7f96
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 160174 5e5fbf2fdbf5007373e8f76a762b875d
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 83092 96d39f59f5dbb721fc5bbd370f0b3540
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 57086 00f8a4e9617f841bd90e57d2835311f4
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 27700 b373ca19c5ec767a6398dffc9bedd553
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 174170 ff1770256477129693ba12fa671d00f2
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 257882 c5a46d4e9d96ab2e705e5a538cf3731e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 802012 68d7baf4f9f6c09fbf4f1c0e382fa182
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 3517048 e614b7e4a6a126f9b7dd67f6efefd117
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_powerpc.deb
Size/MD5: 85044 6187f4e8bac574e941da55a6a69690af
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 1061366 41136167b401a0728acbcdb4019d10a9
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 152744 080f6cd7a3b25dafb7a859b7feb7095e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 77452 04f109d31474b5aa18934e158adf6d62
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 54694 2300562f2a7cfb8d4a33f881332ace15
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 25448 53b2a8352578c81f64e8f4cab898007b
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 172760 f147f6913ced592759716f7b3df63af2
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 255112 3257864700e4387e8cf4e11e5f4aef4e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 761444 626f9943c20f6c2f8cddfaed957e0251
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 3312976 945e1150e98d3545f2790ceaec85220f
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_sparc.deb
Size/MD5: 82324 33c251009e49841c9ae76e74a1e4e559
Updated packages for Ubuntu 10.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.diff.gz
Size/MD5: 14357 2913cf42deabe02923039b83f4d3a09b
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.dsc
Size/MD5: 2426 d8addbeb6ab59e8dfeaab3262b4215e8
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3.orig.tar.gz
Size/MD5: 1791880 1024c608a8a7c1d6ec301bddf11f3af9
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 64468 6a423398bc892f513b2f38e2e3d5c602
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 31168 539169982c29fbd85ad92d3564b46332
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 1103468 a14ada191171b0af80c8ed455cc43602
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 165088 a094e30c378323c4e13fce76cb41eaef
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 83900 ba49980dc7ae19ec805f2d2e0a9dd341
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 59162 2e9264fd1688912c647a684349b04bc1
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 26422 f2e204b7a284aa1c7762671eb764f65f
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 175388 12fdd82ec02447154cb66ffee97eb6bd
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 262250 4b22149a50d268aff9c443f577272ec9
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 783016 b6a88c5290d6584cf118e03486ee5b28
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 3782700 92aaee73614843eb71a1e894d6e6b6db
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_amd64.deb
Size/MD5: 84584 cff59800844c6d64d58481682d7096c2
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 61226 2daec50e448a0023cefc89ecdac63e2f
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 31404 ad307f5350fd07a9cc409f4e9e1a76a3
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 1031432 cb1b0f48c777da1e83104a1f8a92850c
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 156646 33c97aaca1542522ac44c0c2c1aa32f9
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 80682 9c4b0a4534eb6719a7d9f974b2fc8b61
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 56974 6d8a32bff9e98d95c8cf754c47aae4f6
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 25986 ce814f61d00c0be09742cff50d691d1a
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 172378 d6a441c24baa014e23428de75ee78913
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 246084 0f3d944e284b2e96f78ff7c897d89310
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 746296 c5b46a4f36381b2d6ac1f4cdc973a85d
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 3694024 28b7b242f8fe4b6decc198ce2cddc5e4
http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_i386.deb
Size/MD5: 79640 326c2ea9f373fec8622ca654b942fee2
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 65034 e6fe859f3e6071f20f9cf880107c1f2e
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 32576 1923fe67aeb448dae67c0c3de7acad51
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 1182088 7d90bf72cedc6ccda4da639e657ba3ec
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 171878 728ed879151c66c82c09d074ca3d6b74
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 88564 38714d7ad6697b4231e2c89c511195c4
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 60498 2422b28c607abc4cf25388199ad89052
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 27190 4e063517954ef91ae8ce1d959f939bad
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 177264 79deabe8844ba4993b7643a846b6ba7f
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 270448 a6924c87f821b74c9d9ef642d3182194
http://ports.ubuntu.com/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 822532 fded6e9509fb172ea0587cd536b8e24c
http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 3916390 bd49980f1d5fe6a419961106a2635ad6
http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_powerpc.deb
Size/MD5: 82814 8552bb3b2508b96a0c3a2be0b7a02f00
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: tetex security update Advisory ID: RHSA-2012:1201-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1201.html Issue date: 2012-08-23 CVE Names: CVE-2010-2642 CVE-2010-3702 CVE-2010-3704 CVE-2011-0433 CVE-2011-0764 CVE-2011-1552 CVE-2011-1553 CVE-2011-1554 =====================================================================
- Summary:
Updated tetex packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
- Description:
teTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output.
teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code:
Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. (CVE-2010-2642, CVE-2011-0433)
An invalid pointer dereference flaw was found in t1lib. (CVE-2011-0764)
A use-after-free flaw was found in t1lib. (CVE-2011-1553)
An off-by-one flaw was found in t1lib. (CVE-2011-1554)
An out-of-bounds memory read flaw was found in t1lib. A specially-crafted font file could, when opened, cause teTeX to crash. (CVE-2011-1552)
teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF) file viewer, to allow adding images in PDF format to the generated PDF documents. The following issues affect Xpdf code:
An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was used to process a TeX document referencing a specially-crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3702)
An array index error was found in the way Xpdf parsed PostScript Type 1 fonts embedded in PDF documents. If pdflatex was used to process a TeX document referencing a specially-crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3704)
Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642.
All users of tetex are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
595245 - CVE-2010-3702 xpdf: uninitialized Gfx::parser pointer dereference 638960 - CVE-2010-3704 xpdf: array indexing error in FoFiType1::parse() 666318 - CVE-2010-2642 evince, t1lib: Heap based buffer overflow in DVI file AFM font parser 679732 - CVE-2011-0433 evince, t1lib: Heap-based buffer overflow DVI file AFM font parser 692853 - CVE-2011-1552 t1lib: invalid read crash via crafted Type 1 font 692854 - CVE-2011-1553 t1lib: Use-after-free via crafted Type 1 font 692856 - CVE-2011-1554 t1lib: Off-by-one via crafted Type 1 font 692909 - CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tetex-3.0-33.15.el5_8.1.src.rpm
i386: tetex-3.0-33.15.el5_8.1.i386.rpm tetex-afm-3.0-33.15.el5_8.1.i386.rpm tetex-debuginfo-3.0-33.15.el5_8.1.i386.rpm tetex-doc-3.0-33.15.el5_8.1.i386.rpm tetex-dvips-3.0-33.15.el5_8.1.i386.rpm tetex-fonts-3.0-33.15.el5_8.1.i386.rpm tetex-latex-3.0-33.15.el5_8.1.i386.rpm tetex-xdvi-3.0-33.15.el5_8.1.i386.rpm
x86_64: tetex-3.0-33.15.el5_8.1.x86_64.rpm tetex-afm-3.0-33.15.el5_8.1.x86_64.rpm tetex-debuginfo-3.0-33.15.el5_8.1.x86_64.rpm tetex-doc-3.0-33.15.el5_8.1.x86_64.rpm tetex-dvips-3.0-33.15.el5_8.1.x86_64.rpm tetex-fonts-3.0-33.15.el5_8.1.x86_64.rpm tetex-latex-3.0-33.15.el5_8.1.x86_64.rpm tetex-xdvi-3.0-33.15.el5_8.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tetex-3.0-33.15.el5_8.1.src.rpm
i386: tetex-3.0-33.15.el5_8.1.i386.rpm tetex-afm-3.0-33.15.el5_8.1.i386.rpm tetex-debuginfo-3.0-33.15.el5_8.1.i386.rpm tetex-doc-3.0-33.15.el5_8.1.i386.rpm tetex-dvips-3.0-33.15.el5_8.1.i386.rpm tetex-fonts-3.0-33.15.el5_8.1.i386.rpm tetex-latex-3.0-33.15.el5_8.1.i386.rpm tetex-xdvi-3.0-33.15.el5_8.1.i386.rpm
ia64: tetex-3.0-33.15.el5_8.1.ia64.rpm tetex-afm-3.0-33.15.el5_8.1.ia64.rpm tetex-debuginfo-3.0-33.15.el5_8.1.ia64.rpm tetex-doc-3.0-33.15.el5_8.1.ia64.rpm tetex-dvips-3.0-33.15.el5_8.1.ia64.rpm tetex-fonts-3.0-33.15.el5_8.1.ia64.rpm tetex-latex-3.0-33.15.el5_8.1.ia64.rpm tetex-xdvi-3.0-33.15.el5_8.1.ia64.rpm
ppc: tetex-3.0-33.15.el5_8.1.ppc.rpm tetex-afm-3.0-33.15.el5_8.1.ppc.rpm tetex-debuginfo-3.0-33.15.el5_8.1.ppc.rpm tetex-doc-3.0-33.15.el5_8.1.ppc.rpm tetex-dvips-3.0-33.15.el5_8.1.ppc.rpm tetex-fonts-3.0-33.15.el5_8.1.ppc.rpm tetex-latex-3.0-33.15.el5_8.1.ppc.rpm tetex-xdvi-3.0-33.15.el5_8.1.ppc.rpm
s390x: tetex-3.0-33.15.el5_8.1.s390x.rpm tetex-afm-3.0-33.15.el5_8.1.s390x.rpm tetex-debuginfo-3.0-33.15.el5_8.1.s390x.rpm tetex-doc-3.0-33.15.el5_8.1.s390x.rpm tetex-dvips-3.0-33.15.el5_8.1.s390x.rpm tetex-fonts-3.0-33.15.el5_8.1.s390x.rpm tetex-latex-3.0-33.15.el5_8.1.s390x.rpm tetex-xdvi-3.0-33.15.el5_8.1.s390x.rpm
x86_64: tetex-3.0-33.15.el5_8.1.x86_64.rpm tetex-afm-3.0-33.15.el5_8.1.x86_64.rpm tetex-debuginfo-3.0-33.15.el5_8.1.x86_64.rpm tetex-doc-3.0-33.15.el5_8.1.x86_64.rpm tetex-dvips-3.0-33.15.el5_8.1.x86_64.rpm tetex-fonts-3.0-33.15.el5_8.1.x86_64.rpm tetex-latex-3.0-33.15.el5_8.1.x86_64.rpm tetex-xdvi-3.0-33.15.el5_8.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2010-2642.html https://www.redhat.com/security/data/cve/CVE-2010-3702.html https://www.redhat.com/security/data/cve/CVE-2010-3704.html https://www.redhat.com/security/data/cve/CVE-2011-0433.html https://www.redhat.com/security/data/cve/CVE-2011-0764.html https://www.redhat.com/security/data/cve/CVE-2011-1552.html https://www.redhat.com/security/data/cve/CVE-2011-1553.html https://www.redhat.com/security/data/cve/CVE-2011-1554.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFQNkf0XlSAg2UNWIIRAiQFAJ9WUAfXKk43rYvg+UYPr0aOZvojRgCeKWRl PAzUWlaBGi1pT+Kr2TaQk1E= =iYiF -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201011-0178", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "9.10" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.04" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.06" }, { "model": "poppler", "scope": "gte", "trust": 1.0, "vendor": "freedesktop", "version": "0.8.7" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "12" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "13" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "xpdf", "scope": "eq", "trust": 1.0, "vendor": "xpdfreader", "version": "3.02" }, { "model": "cups", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "1.3.11" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.10" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.2" }, { "model": "xpdf", "scope": "lte", "trust": 1.0, "vendor": "xpdfreader", "version": "3.01" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "10" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.3" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "14" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "poppler", "scope": "lte", "trust": 1.0, "vendor": "freedesktop", "version": "0.15.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "9.04" }, { "model": "xpdf", "scope": "lt", "trust": 0.8, "vendor": "foolabs", "version": "3.02pl5" }, { "model": "poppler", "scope": "lt", "trust": 0.8, "vendor": "freedesktop", "version": "0.15.1" }, { "model": "openoffice.org", "scope": "lt", "trust": 0.8, "vendor": "openoffice", "version": "3.3" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "rhel optional productivity applications", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "cups", "scope": null, "trust": 0.6, "vendor": "apple", "version": null }, { "model": "pl3", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "3.0" }, { "model": "pl2", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "3.0" }, { "model": "1pl1", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "3.0" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "3.01" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "3.00" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.0.3" }, { "model": "pl1", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.0.2" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.0.2" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.0.1" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.03" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.02" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.01" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "2.0" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "1.01" }, { "model": "0a", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "1.0" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "1.00" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "0.93" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "0.92" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "0.91" }, { "model": "xpdf", "scope": "eq", "trust": 0.3, "vendor": "xpdf", "version": "0.90" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux optional productivity application server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux es 4.8.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux as 4.8.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "poppler", "scope": "eq", "trust": 0.3, "vendor": "poppler", "version": "0.5.4" }, { "model": "poppler", "scope": "eq", "trust": 0.3, "vendor": "poppler", "version": "0.5.3" }, { "model": "poppler", "scope": "eq", "trust": 0.3, "vendor": "poppler", "version": "0.5.1" }, { "model": "oracle pdf import extension", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "1.0.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.2.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.1" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.3" }, { "model": "openoffice", "scope": "eq", "trust": 0.3, "vendor": "openoffice", "version": "3.2" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "kdegraphics", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.3" }, { "model": "kdegraphics", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.3" }, { "model": "kdegraphics", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2.1" }, { "model": "kdegraphics", "scope": "eq", "trust": 0.3, "vendor": "kde", "version": "3.2" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "2.8.2" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "2.8" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "2.1" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "0.132" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "0.131" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "0.112" }, { "model": "gpdf", "scope": "eq", "trust": 0.3, "vendor": "gnome", "version": "0.110" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "oracle pdf import extension", "scope": "ne", "trust": 0.3, "vendor": "openoffice", "version": "1.0.4" } ], "sources": [ { "db": "BID", "id": "43841" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "CNNVD", "id": "CNNVD-201011-038" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:foolabs:xpdf", "vulnerable": true }, { "cpe22Uri": "cpe:/a:freedesktop:poppler", "vulnerable": true }, { "cpe22Uri": "cpe:/a:openoffice:openoffice.org", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_hpc_node", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_workstation", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true }, { "cpe22Uri": "cpe:/a:redhat:rhel_optional_productivity_applications", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002471" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sauli Pahlman; Joel Voss", "sources": [ { "db": "BID", "id": "43841" } ], "trust": 0.3 }, "cve": "CVE-2010-3702", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2010-3702", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2010-3702", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-46307", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-3702", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2010-3702", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201011-038", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-46307", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-46307" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "CNNVD", "id": "CNNVD-201011-038" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference. Xpdf is prone to a vulnerability due to an array-indexing error. \nAn attacker can exploit this issue by tricking an unsuspecting victim into opening a malicious PDF file with an affected application. \nSuccessful exploits will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2010.0:\n f8eeb85b978e98a9bfffce7ab584e9df 2010.0/i586/libpoppler5-0.12.4-1.2mdv2010.0.i586.rpm\n 11b9dfe9e37261bec174c25aae9d71b4 2010.0/i586/libpoppler-devel-0.12.4-1.2mdv2010.0.i586.rpm\n b9af206162c906094204ed13a4620318 2010.0/i586/libpoppler-glib4-0.12.4-1.2mdv2010.0.i586.rpm\n eea6fc72a55f119c2fe7aef2c37400f6 2010.0/i586/libpoppler-glib-devel-0.12.4-1.2mdv2010.0.i586.rpm\n d83f8f81d2cbb11a3a12e0654d63cd11 2010.0/i586/libpoppler-qt2-0.12.4-1.2mdv2010.0.i586.rpm\n 8e1f7d0278a299b55e1b213f90462610 2010.0/i586/libpoppler-qt4-3-0.12.4-1.2mdv2010.0.i586.rpm\n 6f1505518bb6a42bd017f4ed00ed5f3f 2010.0/i586/libpoppler-qt4-devel-0.12.4-1.2mdv2010.0.i586.rpm\n 6bfceb4bbb5565f829c765e15d9f84f8 2010.0/i586/libpoppler-qt-devel-0.12.4-1.2mdv2010.0.i586.rpm\n 69b87e12827e20261bcac5c1a9f6cc47 2010.0/i586/poppler-0.12.4-1.2mdv2010.0.i586.rpm \n b395b580e189eac53cec4cdce2ceaeeb 2010.0/SRPMS/poppler-0.12.4-1.2mdv2010.0.src.rpm\n\n Mandriva Linux 2010.0/X86_64:\n 5ac922ba77b7e24852b032cb96d66dcc 2010.0/x86_64/lib64poppler5-0.12.4-1.2mdv2010.0.x86_64.rpm\n a35fdb10aaaeda661082eea969c8cb10 2010.0/x86_64/lib64poppler-devel-0.12.4-1.2mdv2010.0.x86_64.rpm\n be4e55287976d6d9f0bc8acdd41dc371 2010.0/x86_64/lib64poppler-glib4-0.12.4-1.2mdv2010.0.x86_64.rpm\n 2e63d0dff69e958f0b926cf6d0026c61 2010.0/x86_64/lib64poppler-glib-devel-0.12.4-1.2mdv2010.0.x86_64.rpm\n b50e39d108dc2458c252fbf365e2aaff 2010.0/x86_64/lib64poppler-qt2-0.12.4-1.2mdv2010.0.x86_64.rpm\n 7b249ff04f794fb6a8dc8b05564143e4 2010.0/x86_64/lib64poppler-qt4-3-0.12.4-1.2mdv2010.0.x86_64.rpm\n 121f80f800f144eb489f0cdce287e7ef 2010.0/x86_64/lib64poppler-qt4-devel-0.12.4-1.2mdv2010.0.x86_64.rpm\n fb7297fbbd3758eca663813932d822fe 2010.0/x86_64/lib64poppler-qt-devel-0.12.4-1.2mdv2010.0.x86_64.rpm\n 5fbd9b1cbd0c18cc7f5a77ee8c9421e8 2010.0/x86_64/poppler-0.12.4-1.2mdv2010.0.x86_64.rpm \n b395b580e189eac53cec4cdce2ceaeeb 2010.0/SRPMS/poppler-0.12.4-1.2mdv2010.0.src.rpm\n\n Mandriva Linux 2010.1:\n 039272fbf964bf0cda8ee8be3f73d7f0 2010.1/i586/libpoppler5-0.12.4-2.1mdv2010.1.i586.rpm\n 4b8cd7ba4fcad0fdb13d498d9659353e 2010.1/i586/libpoppler-devel-0.12.4-2.1mdv2010.1.i586.rpm\n 0c8ecda02ad63275628fdf7dbb886d85 2010.1/i586/libpoppler-glib4-0.12.4-2.1mdv2010.1.i586.rpm\n a899985446082afaf7a552a9d093fa7b 2010.1/i586/libpoppler-glib-devel-0.12.4-2.1mdv2010.1.i586.rpm\n 98cc33b6085f8b5a3e450814217a87fc 2010.1/i586/libpoppler-qt2-0.12.4-2.1mdv2010.1.i586.rpm\n aca2798c969fe7e1ae41f8fda8c767bf 2010.1/i586/libpoppler-qt4-3-0.12.4-2.1mdv2010.1.i586.rpm\n 766c5b85413728af84378f56647f3d6e 2010.1/i586/libpoppler-qt4-devel-0.12.4-2.1mdv2010.1.i586.rpm\n e1af5e2dda8be30d3ac1e009ce856588 2010.1/i586/libpoppler-qt-devel-0.12.4-2.1mdv2010.1.i586.rpm\n e2060c17f1f8ece622fbcf94e50205d7 2010.1/i586/poppler-0.12.4-2.1mdv2010.1.i586.rpm \n a3495563ca96089190aef76b6c25df4d 2010.1/SRPMS/poppler-0.12.4-2.1mdv2010.1.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n 142bdd508c9c62480b467b3aa74a6eb1 2010.1/x86_64/lib64poppler5-0.12.4-2.1mdv2010.1.x86_64.rpm\n 423f44b8802e838afbdd9be973bee11b 2010.1/x86_64/lib64poppler-devel-0.12.4-2.1mdv2010.1.x86_64.rpm\n 88b25a582c2bf185196e8d68b2567bd9 2010.1/x86_64/lib64poppler-glib4-0.12.4-2.1mdv2010.1.x86_64.rpm\n 5ea3f17b45cdddf438d4642348f0133d 2010.1/x86_64/lib64poppler-glib-devel-0.12.4-2.1mdv2010.1.x86_64.rpm\n 11e9facfbca3b5d916f480e5053614cd 2010.1/x86_64/lib64poppler-qt2-0.12.4-2.1mdv2010.1.x86_64.rpm\n 51f3818574979e270265d94947b863ff 2010.1/x86_64/lib64poppler-qt4-3-0.12.4-2.1mdv2010.1.x86_64.rpm\n d7c2b054dd96ac00eb7caf957d290cf6 2010.1/x86_64/lib64poppler-qt4-devel-0.12.4-2.1mdv2010.1.x86_64.rpm\n 9533bb591cd679ba8f880b23605e837a 2010.1/x86_64/lib64poppler-qt-devel-0.12.4-2.1mdv2010.1.x86_64.rpm\n a6fd550b90857f4cbfcd97213d5e7918 2010.1/x86_64/poppler-0.12.4-2.1mdv2010.1.x86_64.rpm \n a3495563ca96089190aef76b6c25df4d 2010.1/SRPMS/poppler-0.12.4-2.1mdv2010.1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFM3VkMmqjQ0CJFipgRAt1ZAKDMo9oWIQ/0cZWwYHte7+QQWtASZwCfTuRR\nQp8m00pY+5aiMBWXOR3I64k=\n=VPTO\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\n\nWindows Applications Insecure Library Loading\n\nThe Official, Verified Secunia List:\nhttp://secunia.com/advisories/windows_insecure_library_loading/\n\nThe list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. \n\n\n----------------------------------------------------------------------\n\nTITLE:\nXpdf Two Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA41709\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41709/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41709\n\nRELEASE DATE:\n2010-10-12\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41709/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41709/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41709\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Xpdf, which can potentially\nbe exploited by malicious people to compromise a user\u0027s system. \n\nFor more information see vulnerabilities #1 and #2 in:\nSA41596\n\nSOLUTION:\nDo not open files from untrusted sources. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported in Poppler by Joel Voss, Leviathan Security Group. \n\nORIGINAL ADVISORY:\nhttps://rhn.redhat.com/errata/RHSA-2010-0751.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201402-17\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Xpdf: User-assisted execution of arbitrary code\n Date: February 17, 2014\n Bugs: #386271\n ID: 201402-17\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Xpdf could result in execution of arbitrary\ncode. \n\nBackground\n==========\n\nXpdf is an X viewer for PDF files. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-text/xpdf \u003c= 3.02-r4 Vulnerable!\n -------------------------------------------------------------------\n NOTE: Certain packages are still vulnerable. Users should migrate\n to another package if one is available or wait for the\n existing packages to be marked stable by their\n architecture maintainers. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA context-dependent attacker could execute arbitrary code or cause a\nDenial of Service condition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nGentoo has discontinued support for Xpdf. We recommend that users\nunmerge Xpdf:\n\n # emerge --unmerge \"app-text/xpdf\"\n\nReferences\n==========\n\n[ 1 ] CVE-2009-4035\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4035\n[ 2 ] CVE-2010-3702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3702\n[ 3 ] CVE-2010-3704\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3704\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201402-17.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 3.02-1.4+lenny3. \n\nFor the upcoming stable distribution (squeeze) and the unstable \ndistribution (sid), these problems don\u0027t apply, since xpdf has been \npatched to use the Poppler PDF library. \n\nUpgrade instructions\n- --------------------\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ===========================================================\nUbuntu Security Notice USN-1005-1 October 19, 2010\npoppler vulnerabilities\nCVE-2010-3702, CVE-2010-3703, CVE-2010-3704\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 9.04\nUbuntu 9.10\nUbuntu 10.04 LTS\nUbuntu 10.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libpoppler1 0.5.1-0ubuntu7.8\n libpoppler1-glib 0.5.1-0ubuntu7.8\n\nUbuntu 8.04 LTS:\n libpoppler-glib2 0.6.4-1ubuntu3.5\n libpoppler2 0.6.4-1ubuntu3.5\n\nUbuntu 9.04:\n libpoppler-glib4 0.10.5-1ubuntu2.6\n libpoppler4 0.10.5-1ubuntu2.6\n\nUbuntu 9.10:\n libpoppler-glib4 0.12.0-0ubuntu2.3\n libpoppler5 0.12.0-0ubuntu2.3\n\nUbuntu 10.04 LTS:\n libpoppler-glib4 0.12.4-0ubuntu5.1\n libpoppler5 0.12.4-0ubuntu5.1\n\nUbuntu 10.10:\n libpoppler-glib5 0.14.3-0ubuntu1.1\n libpoppler7 0.14.3-0ubuntu1.1\n\nIn general, a standard system update will make all the necessary changes. \n\nDetails follow:\n\nIt was discovered that poppler contained multiple security issues when\nparsing malformed PDF documents. \n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.diff.gz\n Size/MD5: 27259 bedbca4c7d1fbb131e87ac7d01b9ccfb\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.dsc\n Size/MD5: 2375 9242a34c31aec338034bad41ff0e04fb\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz\n Size/MD5: 954930 a136cd731892f4570933034ba97c8704\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 729804 990c4697220246f06734ec985bf79805\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 58242 4e17049f4d461125928bd33eb905542e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 47402 2e1911778f8d114dc01570a16cc753fa\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 52998 4dc5f9471611f96ec0bfb5314a527d67\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 43618 37459b85fdf031fdba6e1b35ea116679\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 546536 7ad7ef20bd092f9007a0a4f2920d301d\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_amd64.deb\n Size/MD5: 101316 389d8b7bf42dd291ae246bbe5306c66e\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 664928 8670a45be74a527aa2381c786d6f499c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 56038 20fa91b22991fbf8f2855d0019a30066\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 46100 aa511d2877d5a86ee35fb8760168e746\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 51888 e635377fcd0afcc86fb5665f12596940\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 43120 0a299604034207977e6549719e97c3bb\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 505126 546b78451a3db468d906a13c3e461755\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_i386.deb\n Size/MD5: 93028 075e41dd3d3608e7e4a5f682d3ab0d45\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 769490 69fe73d00ba079febc5ada96e82cb518\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 60272 ef55f2b86d376cfc7f81786fa56f0852\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 47556 20725d1ceae67bd27b629bda23ea27aa\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 54288 f1652517075e0ea34c6b762e8e1ec6ba\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 44890 7ce2dad1bd9962aecd9184b74de80dbd\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 552776 7b30e7f41666d93aaa7d3a95537333d8\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_powerpc.deb\n Size/MD5: 105656 6d4c33c8c30e18aba3e5248d19945312\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 690766 199896329398917fe8f2a37179d02a34\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 56618 d6fe358f5cdcbc02450e69db342ee8b3\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 46092 5d19384e2488912b2ba4d98ff39906b7\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 51360 9b6aaada69d2fd81edbf8a3f1e236256\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 42362 914f0dfd79b25858ad12ad20c4407905\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 518396 ccb5b4d7b6a3966174b55e82597d90b8\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_sparc.deb\n Size/MD5: 93880 6343457c99d3fe9e95c65e7f11ed1688\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.diff.gz\n Size/MD5: 22610 e40e61ff8f404dd8c570d7d9d37d3344\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.dsc\n Size/MD5: 1832 5e30251249c773f2fdb94278bf11050c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4.orig.tar.gz\n Size/MD5: 1294481 13d12ca4e349574cfbbcf4a9b2b3ae52\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 899230 8fce2b7acfae6b6397caf9caf140a031\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 110018 dfafa5b34781fe749705af443a32d855\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 54810 5febb6077ff4019f33ef36b39d05087b\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 46176 f53d822dbade16249befcf24f503c443\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 25520 85571978f17908b52fde4a635b1a411e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 146760 9ff80c2dbf2bb811e31e1b66caf6279c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 201282 909dc624c82bc3c89a0b46ee49fc080f\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 648816 9c4f1dbc90f19b95970d601d05ebf72b\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_amd64.deb\n Size/MD5: 78984 ea5c07bc1f8cc794416c93e05b4f4815\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 839500 f428fc3b2317229955ebf3145bd8b1ef\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 102844 5abd270a2f436fd79d5fa021ed0a75a2\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 52354 58e6cec2618c530ae21ca02fb009da06\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 42614 9370944020717ba5be753fe28ab981d0\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 25050 57ac26b842693f33b609ea6d6ced073b\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 143622 9f476e4d71f8693f39e73e76c9a65d3c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 190086 b40f870abc3aa6f6b8203de269e88d93\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 623310 43c9e0e5063794de8b008a567dd48545\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_i386.deb\n Size/MD5: 73692 d5434601a4e7ef66297888f349217a1f\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 859546 59e85a8660b8972ffac2b9964be303bd\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 103834 2dd93fcfeb085ad2d2ebbf2631b094e9\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 52614 bfa697640e43ddb7314d66f7107e021f\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 43048 f1173347bdf4b450a9058f558a0e98e0\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 24792 2f1a32e1c3062d9ff8ad2bac1a89a5e2\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 145068 e079cb3940740d3866454898c7a635ba\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 191294 c0083aef2f0adfc21064be2f95f6316d\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 637232 bff9ecff5a68a668e00a2c0bab55b290\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_lpia.deb\n Size/MD5: 74708 14d03ac4f0abc79bb2b7696776db9362\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 956836 642c3332a4295161be0729b72f6ccfb0\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 115792 671359d71e699df8ef011ef9b1b97e13\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 58464 118f2e096f121fb43ad8a287335f5892\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 46142 60ec3d227164cb4f52531bf0d0d94a71\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 28862 cf22690c891eaf82c9587faff7e7aec1\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 152744 fef8f36a164ceb3a425882cc697d9cad\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 209554 7c20fafa41749c91709a2c925844cad1\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 683376 5c9e55ebefa5e5dfabbd72787bf5b7bb\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_powerpc.deb\n Size/MD5: 94454 50f79c3f37ccade2e26ac5f01fedb367\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 859950 ca8b01d58970c27729fb9311f7706611\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 104158 a60feaf9f57f703ae37d4587071e10e3\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 51408 3a832dd5583a5ebdca67fb868b774f46\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 42008 563aa6cce06916284a5bbccc8f9a4a2a\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 23902 dbda45ef43ff352439a2595766a8725f\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 145340 fcacd993458d4e16e4104b1c2fef74b5\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 193258 872f6f3ef8af1a386100f929342c23f3\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 631572 31bc91916469b6fee1e4ed2411b98c70\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_sparc.deb\n Size/MD5: 72984 85a3e42acdf1819c8fc07053cb9012c3\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.diff.gz\n Size/MD5: 22658 46a4434de1013ad6a1aedd7f83f4638e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.dsc\n Size/MD5: 2319 cb6568c37577a77805a323102daf8cbe\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5.orig.tar.gz\n Size/MD5: 1516687 125f671a19707861132fb03e73b61184\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 1000762 2511c181edee11136cd95f2fd8f7df4e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 124320 8e44bb95aaf500ea3f5f2cfeda92c77b\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 64498 433f22fd427b85eda6c6f79c093c7bf4\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 51136 3fce9dd192f7cf72beb2a462b78a045f\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 26084 40b1eb43d7c31c344ee807f67b56405a\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 166096 856ebcf506dfe1e6f73a16d039683576\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 235030 001590442c32e9d44d12c708cb484a34\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 715688 100b06d8f1c178b74a72627c1293a99d\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 3191282 9fad2dc154e6816007978eecba272f98\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_amd64.deb\n Size/MD5: 80310 e6f5e58168c6548ee953afc2f2e198e2\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 939116 1a637f61cc6980c737f0485fc2ee9d46\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 118186 be93a766d70095e2b904e8a1059c1ea9\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 61432 b48d904620036b494dae30f846757933\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 48108 502e462be767601fd4f37278ff6fb0c9\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 25400 0d97956139ca4df762ff50924775c7ee\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 164406 c48888d902bace1af6f9568bc7d11781\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 219842 642d8bf864daa53baa9aba14ef1d8e8d\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 687198 ebd3b55dd94130e8031fce6fdd9c2977\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 3106210 be7d517d3130e27b75b778b1fafab2c2\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_i386.deb\n Size/MD5: 75150 842cb849ecdc92162f1ef0645a89694a\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 951712 5833f800109087edef20d0d2e043a2a0\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 118064 f415be637dbb5991ce0cf7d4bc62b9b7\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 61512 247589fb21e89512e10055a39cdef0c0\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 48234 53a1552904e2243babf5b4480f4e39d2\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 25090 fe55913c8f07a2d573d202669dd1697e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 164652 37ca1c8caa83a03a65f2d24d4f7576bb\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 220064 5d8c233389507dc10c6830ab35ab31e4\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 698034 6b6e1e71dc2b4d73ce5d91ab18ed1434\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 3141000 792164965ecec628891930c15056146e\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_lpia.deb\n Size/MD5: 75852 566179c180af7420345a59aef66d20ab\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 1067816 72f7c6c253c7a0d6de9572a45b766bea\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 132060 05faca87e109c1c75a82a458b2d23949\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 69138 2c877d50106cacbfa82cb9e60e572e7e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 51250 377d0b6a2fb986aafde1ee9f8045e04a\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 28790 9a4a744f8bbaee83ab3e0d624425dda3\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 170364 ce061c2566a07dd3c159a23d66d829fc\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 239232 b223e0531752af48a78b9feb2964e77a\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 751112 72ec27c3cfa98ec9c51e1735b233d70a\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 3289146 731cdf54cada7da65a2a3c939df59f93\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_powerpc.deb\n Size/MD5: 92846 b62d9487645a67d4c892c3671a75e05c\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 958890 6948353f591647da86e316845ec8f9eb\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 120824 6ff59a3bbd4a9b425ef23110a76c4298\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 61180 2cc5e6f027e76b607defdc9a797fea4d\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 47586 c343721df8aec6efa801c42368c65187\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 24302 829a6fd6cb43629453b0d03abb134c74\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 165794 e2baae9323c3dc1bfd4c7a5188b876a4\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 227060 24c905d2bf65312b9654f3a8c3ff1b85\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 699612 e891d015a5e9f4a06c62330ae13ad8ff\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 3054006 65d02dc72ebedeee044492a0d54a7c9b\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_sparc.deb\n Size/MD5: 75462 14106f64edcc64399c73cecfffe82660\n\nUpdated packages for Ubuntu 9.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.diff.gz\n Size/MD5: 16162 e2f7027909f54a82d3b05a5dab49bfe3\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.dsc\n Size/MD5: 2333 0ca7e3c51f46e811ab8b764d19735017\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0.orig.tar.gz\n Size/MD5: 1595424 399b25d9d71ad22bc9a2a9281769c49c\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 1051980 811eb825ef2a4a35a2737c7cc8f7dc18\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 147620 0df853686d2bde4d3251e2034d4aaca4\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 75082 66a4118be485eca8c0d64bcb507d95fe\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 56040 9aa3e75a67f5b3325354e0cd0783b4eb\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 26016 ab04a30595e5e10a8ea324ce5429859d\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 169758 a0feabc74a20a921577bb14b328f4f08\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 246134 66b67de914b70e969cef45ad38be8350\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 758072 3759109d011266b2f989d6d4b9c700f8\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 3352576 018f3529b1b4b66eb8fce6446e151276\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_amd64.deb\n Size/MD5: 84178 3242ad6a0e40ac5017b25f252026b4ec\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 989400 4c6f5530a2751fbef0c4cf2b91c0a450\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 140982 8b2732a5ee3087e754cfbc8a311508a9\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 72374 9dafd2e2f353b30269b61184d8a05a73\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 53740 92abc5198ae95accc2a9c04535a12e74\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 25630 9ed21683dc9ce42230357a75c9f8efaf\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 166244 5407024e0fbca9ca17cf31784689f530\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 231402 085ad28bb8f30fb81c922bdf98461f62\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 725946 56e85e5a60eded5dd71286df5afcddad\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 3273936 4900c20227ee15c570803e0a5ea2380e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_i386.deb\n Size/MD5: 80140 8397685b99e33d2295945e01b5a9c5a9\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 1024116 82f69ec56049caaaa2e6d6ddfbcf38e9\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 145452 ca9c8d859dd2c259254c1015c8150e7c\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 73070 93faf777eb853626a8021a4fdf951ae0\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 53314 f04f80d8c690dd8eed9f2d8629b82ab6\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 24216 5597f9b407ed6e297dfb60495a926835\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 168690 d5f6fc3fd30c50549a0425684be4456f\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 244286 73acb1d168e1b946fc0ab87e52a98d2b\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 749218 e362ac899fed10132a24579c856392bf\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 3243524 b3809cb3b43f6c6fcbf78e5f195454b8\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_sparc.deb\n Size/MD5: 80606 84e09ef47c3a62d374f7d72d077857f7\n\nUpdated packages for Ubuntu 10.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.diff.gz\n Size/MD5: 36586 3c8f46489d270a6553c603f1bf42df61\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.dsc\n Size/MD5: 2321 6309c218890373f2d2f3829083f1e14e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4.orig.tar.gz\n Size/MD5: 1674400 4155346f9369b192569ce9184ff73e43\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 1057464 02cfbb58b185dce47f79752bc448ecfb\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 153226 6a1cd66dad1f036c916834a9bee5290e\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 79122 fc4779709ed8b692f9debc48054dcf66\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 56012 6c389ff1ec4144b526b34e3df0390361\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 26902 e4f305ff49b07e2d4266f3c23b737328\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 172296 6a277bb044e8bddf0b7211ef4f201e8a\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 252048 07a540e9727055ad6ea3af4805ca02f4\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 762152 b900a754d1f4fd137a984a5d9a428b49\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 3392098 40b5213d5c65333912cb2a6837cb8155\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_amd64.deb\n Size/MD5: 84984 222e314966329a71370119194760f289\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 994314 0cf46cddcca262acb400301c6ccfadcf\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 146050 ecfd6621c0c8125575908fce67e87037\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 75926 9460e967f9ea99f6e52cea7b82794cf1\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 53792 094890d2058126fad34a2a9f1b74a9fe\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 26526 ae6f93323c82c1d452e81335025c4677\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 169754 b69d20dacb024e9412954289e62606e5\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 237416 79df3cbaef280ae078fe5d90d1efeca6\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 729896 ebd5b47847b7d4c2d6a7956d5f2b9c9c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 3308176 1901fd74a67d54354fc37140a3820651\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_i386.deb\n Size/MD5: 80940 24c64a45a096f19bc5e29ac070570932\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 1139050 391b272517bddffbfecbbc91a43b7f96\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 160174 5e5fbf2fdbf5007373e8f76a762b875d\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 83092 96d39f59f5dbb721fc5bbd370f0b3540\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 57086 00f8a4e9617f841bd90e57d2835311f4\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 27700 b373ca19c5ec767a6398dffc9bedd553\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 174170 ff1770256477129693ba12fa671d00f2\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 257882 c5a46d4e9d96ab2e705e5a538cf3731e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 802012 68d7baf4f9f6c09fbf4f1c0e382fa182\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 3517048 e614b7e4a6a126f9b7dd67f6efefd117\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_powerpc.deb\n Size/MD5: 85044 6187f4e8bac574e941da55a6a69690af\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 1061366 41136167b401a0728acbcdb4019d10a9\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 152744 080f6cd7a3b25dafb7a859b7feb7095e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 77452 04f109d31474b5aa18934e158adf6d62\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 54694 2300562f2a7cfb8d4a33f881332ace15\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 25448 53b2a8352578c81f64e8f4cab898007b\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 172760 f147f6913ced592759716f7b3df63af2\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 255112 3257864700e4387e8cf4e11e5f4aef4e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 761444 626f9943c20f6c2f8cddfaed957e0251\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 3312976 945e1150e98d3545f2790ceaec85220f\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_sparc.deb\n Size/MD5: 82324 33c251009e49841c9ae76e74a1e4e559\n\nUpdated packages for Ubuntu 10.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.diff.gz\n Size/MD5: 14357 2913cf42deabe02923039b83f4d3a09b\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.dsc\n Size/MD5: 2426 d8addbeb6ab59e8dfeaab3262b4215e8\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3.orig.tar.gz\n Size/MD5: 1791880 1024c608a8a7c1d6ec301bddf11f3af9\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 64468 6a423398bc892f513b2f38e2e3d5c602\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 31168 539169982c29fbd85ad92d3564b46332\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 1103468 a14ada191171b0af80c8ed455cc43602\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 165088 a094e30c378323c4e13fce76cb41eaef\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 83900 ba49980dc7ae19ec805f2d2e0a9dd341\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 59162 2e9264fd1688912c647a684349b04bc1\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 26422 f2e204b7a284aa1c7762671eb764f65f\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 175388 12fdd82ec02447154cb66ffee97eb6bd\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 262250 4b22149a50d268aff9c443f577272ec9\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 783016 b6a88c5290d6584cf118e03486ee5b28\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 3782700 92aaee73614843eb71a1e894d6e6b6db\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_amd64.deb\n Size/MD5: 84584 cff59800844c6d64d58481682d7096c2\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 61226 2daec50e448a0023cefc89ecdac63e2f\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 31404 ad307f5350fd07a9cc409f4e9e1a76a3\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 1031432 cb1b0f48c777da1e83104a1f8a92850c\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 156646 33c97aaca1542522ac44c0c2c1aa32f9\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 80682 9c4b0a4534eb6719a7d9f974b2fc8b61\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 56974 6d8a32bff9e98d95c8cf754c47aae4f6\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 25986 ce814f61d00c0be09742cff50d691d1a\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 172378 d6a441c24baa014e23428de75ee78913\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 246084 0f3d944e284b2e96f78ff7c897d89310\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 746296 c5b46a4f36381b2d6ac1f4cdc973a85d\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 3694024 28b7b242f8fe4b6decc198ce2cddc5e4\n http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_i386.deb\n Size/MD5: 79640 326c2ea9f373fec8622ca654b942fee2\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 65034 e6fe859f3e6071f20f9cf880107c1f2e\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 32576 1923fe67aeb448dae67c0c3de7acad51\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 1182088 7d90bf72cedc6ccda4da639e657ba3ec\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 171878 728ed879151c66c82c09d074ca3d6b74\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 88564 38714d7ad6697b4231e2c89c511195c4\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 60498 2422b28c607abc4cf25388199ad89052\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 27190 4e063517954ef91ae8ce1d959f939bad\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 177264 79deabe8844ba4993b7643a846b6ba7f\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 270448 a6924c87f821b74c9d9ef642d3182194\n http://ports.ubuntu.com/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 822532 fded6e9509fb172ea0587cd536b8e24c\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 3916390 bd49980f1d5fe6a419961106a2635ad6\n http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_powerpc.deb\n Size/MD5: 82814 8552bb3b2508b96a0c3a2be0b7a02f00\n\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: tetex security update\nAdvisory ID: RHSA-2012:1201-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-1201.html\nIssue date: 2012-08-23\nCVE Names: CVE-2010-2642 CVE-2010-3702 CVE-2010-3704 \n CVE-2011-0433 CVE-2011-0764 CVE-2011-1552 \n CVE-2011-1553 CVE-2011-1554 \n=====================================================================\n\n1. Summary:\n\nUpdated tetex packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. Description:\n\nteTeX is an implementation of TeX. TeX takes a text file and a set of\nformatting commands as input, and creates a typesetter-independent DeVice\nIndependent (DVI) file as output. \n\nteTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1\nfonts. The following issues affect t1lib code:\n\nTwo heap-based buffer overflow flaws were found in the way t1lib processed\nAdobe Font Metrics (AFM) files. (CVE-2010-2642,\nCVE-2011-0433)\n\nAn invalid pointer dereference flaw was found in t1lib. \n(CVE-2011-0764)\n\nA use-after-free flaw was found in t1lib. (CVE-2011-1553)\n\nAn off-by-one flaw was found in t1lib. (CVE-2011-1554)\n\nAn out-of-bounds memory read flaw was found in t1lib. A specially-crafted\nfont file could, when opened, cause teTeX to crash. (CVE-2011-1552)\n\nteTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)\nfile viewer, to allow adding images in PDF format to the generated PDF\ndocuments. The following issues affect Xpdf code:\n\nAn uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was\nused to process a TeX document referencing a specially-crafted PDF file, it\ncould cause pdflatex to crash or, potentially, execute arbitrary code with\nthe privileges of the user running pdflatex. (CVE-2010-3702)\n\nAn array index error was found in the way Xpdf parsed PostScript Type 1\nfonts embedded in PDF documents. If pdflatex was used to process a TeX\ndocument referencing a specially-crafted PDF file, it could cause pdflatex\nto crash or, potentially, execute arbitrary code with the privileges of the\nuser running pdflatex. (CVE-2010-3704)\n\nRed Hat would like to thank the Evince development team for reporting\nCVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the\noriginal reporter of CVE-2010-2642. \n\nAll users of tetex are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n595245 - CVE-2010-3702 xpdf: uninitialized Gfx::parser pointer dereference\n638960 - CVE-2010-3704 xpdf: array indexing error in FoFiType1::parse()\n666318 - CVE-2010-2642 evince, t1lib: Heap based buffer overflow in DVI file AFM font parser\n679732 - CVE-2011-0433 evince, t1lib: Heap-based buffer overflow DVI file AFM font parser\n692853 - CVE-2011-1552 t1lib: invalid read crash via crafted Type 1 font\n692854 - CVE-2011-1553 t1lib: Use-after-free via crafted Type 1 font\n692856 - CVE-2011-1554 t1lib: Off-by-one via crafted Type 1 font\n692909 - CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/tetex-3.0-33.15.el5_8.1.src.rpm\n\ni386:\ntetex-3.0-33.15.el5_8.1.i386.rpm\ntetex-afm-3.0-33.15.el5_8.1.i386.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.i386.rpm\ntetex-doc-3.0-33.15.el5_8.1.i386.rpm\ntetex-dvips-3.0-33.15.el5_8.1.i386.rpm\ntetex-fonts-3.0-33.15.el5_8.1.i386.rpm\ntetex-latex-3.0-33.15.el5_8.1.i386.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.i386.rpm\n\nx86_64:\ntetex-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-afm-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-doc-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-dvips-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-fonts-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-latex-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/tetex-3.0-33.15.el5_8.1.src.rpm\n\ni386:\ntetex-3.0-33.15.el5_8.1.i386.rpm\ntetex-afm-3.0-33.15.el5_8.1.i386.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.i386.rpm\ntetex-doc-3.0-33.15.el5_8.1.i386.rpm\ntetex-dvips-3.0-33.15.el5_8.1.i386.rpm\ntetex-fonts-3.0-33.15.el5_8.1.i386.rpm\ntetex-latex-3.0-33.15.el5_8.1.i386.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.i386.rpm\n\nia64:\ntetex-3.0-33.15.el5_8.1.ia64.rpm\ntetex-afm-3.0-33.15.el5_8.1.ia64.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.ia64.rpm\ntetex-doc-3.0-33.15.el5_8.1.ia64.rpm\ntetex-dvips-3.0-33.15.el5_8.1.ia64.rpm\ntetex-fonts-3.0-33.15.el5_8.1.ia64.rpm\ntetex-latex-3.0-33.15.el5_8.1.ia64.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.ia64.rpm\n\nppc:\ntetex-3.0-33.15.el5_8.1.ppc.rpm\ntetex-afm-3.0-33.15.el5_8.1.ppc.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.ppc.rpm\ntetex-doc-3.0-33.15.el5_8.1.ppc.rpm\ntetex-dvips-3.0-33.15.el5_8.1.ppc.rpm\ntetex-fonts-3.0-33.15.el5_8.1.ppc.rpm\ntetex-latex-3.0-33.15.el5_8.1.ppc.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.ppc.rpm\n\ns390x:\ntetex-3.0-33.15.el5_8.1.s390x.rpm\ntetex-afm-3.0-33.15.el5_8.1.s390x.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.s390x.rpm\ntetex-doc-3.0-33.15.el5_8.1.s390x.rpm\ntetex-dvips-3.0-33.15.el5_8.1.s390x.rpm\ntetex-fonts-3.0-33.15.el5_8.1.s390x.rpm\ntetex-latex-3.0-33.15.el5_8.1.s390x.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.s390x.rpm\n\nx86_64:\ntetex-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-afm-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-debuginfo-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-doc-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-dvips-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-fonts-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-latex-3.0-33.15.el5_8.1.x86_64.rpm\ntetex-xdvi-3.0-33.15.el5_8.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2010-2642.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3702.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3704.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-0433.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-0764.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1552.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1553.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1554.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFQNkf0XlSAg2UNWIIRAiQFAJ9WUAfXKk43rYvg+UYPr0aOZvojRgCeKWRl\nPAzUWlaBGi1pT+Kr2TaQk1E=\n=iYiF\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2010-3702" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "BID", "id": "43841" }, { "db": "VULHUB", "id": "VHN-46307" }, { "db": "PACKETSTORM", "id": "95788" }, { "db": "PACKETSTORM", "id": "95792" }, { "db": "PACKETSTORM", "id": "94635" }, { "db": "PACKETSTORM", "id": "125234" }, { "db": "PACKETSTORM", "id": "96881" }, { "db": "PACKETSTORM", "id": "94989" }, { "db": "PACKETSTORM", "id": "115842" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-46307", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-46307" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-3702", "trust": 3.4 }, { "db": "BID", "id": "43845", "trust": 2.5 }, { "db": "SECUNIA", "id": "43079", "trust": 2.5 }, { "db": "VUPEN", "id": "ADV-2011-0230", "trust": 2.5 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2010/10/04/6", "trust": 1.7 }, { "db": "SECUNIA", "id": "42691", "trust": 1.7 }, { "db": "SECUNIA", "id": "42357", "trust": 1.7 }, { "db": "SECUNIA", "id": "42141", "trust": 1.7 }, { "db": "SECUNIA", "id": "42397", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2010-2897", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2010-3097", "trust": 1.7 }, { "db": "SECUNIA", "id": "41709", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2010-002471", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201011-038", "trust": 0.7 }, { "db": "BID", "id": "43841", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "95788", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "94989", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "96881", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "95792", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "115987", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "95787", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "95789", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-46307", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "94635", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125234", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "115842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-46307" }, { "db": "BID", "id": "43841" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "PACKETSTORM", "id": "95788" }, { "db": "PACKETSTORM", "id": "95792" }, { "db": "PACKETSTORM", "id": "94635" }, { "db": "PACKETSTORM", "id": "125234" }, { "db": "PACKETSTORM", "id": "96881" }, { "db": "PACKETSTORM", "id": "94989" }, { "db": "PACKETSTORM", "id": "115842" }, { "db": "CNNVD", "id": "CNNVD-201011-038" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "id": "VAR-201011-0178", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-46307" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:35:48.998000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "poppler-0.5.4-4.4.14.0.1.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1272" }, { "title": "2136", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2136" }, { "title": "2138", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2138" }, { "title": "2139", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2139" }, { "title": "Top Page", "trust": 0.8, "url": "http://poppler.freedesktop.org/" }, { "title": "RHSA-2010:0749", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0749.html" }, { "title": "RHSA-2010:0750", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0750.html" }, { "title": "RHSA-2010:0751", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0751.html" }, { "title": "RHSA-2010:0752", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0752.html" }, { "title": "RHSA-2010:0753", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0753.html" }, { "title": "RHSA-2010:0754", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0754.html" }, { "title": "RHSA-2010:0755", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0755.html" }, { "title": "RHSA-2010:0859", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2010-0859.html" }, { "title": "cve_2010_3702_cve_2010", "trust": 0.8, "url": "http://blogs.sun.com/security/entry/cve_2010_3702_cve_2010" }, { "title": "download", "trust": 0.8, "url": "http://www.foolabs.com/xpdf/download.html" }, { "title": "xpdf-3.02pl5", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=35067" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "CNNVD", "id": "CNNVD-201011-038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-46307" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.securityfocus.com/bid/43845" }, { "trust": 2.5, "url": "http://secunia.com/advisories/43079" }, { "trust": 2.5, "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "trust": 2.3, "url": "http://www.debian.org/security/2010/dsa-2119" }, { "trust": 2.3, "url": "http://www.debian.org/security/2010/dsa-2135" }, { "trust": 2.0, "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "trust": 2.0, "url": "http://www.openoffice.org/security/cves/cve-2010-3702_cve-2010-3704.html" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2012-1201.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/42141" }, { "trust": 1.7, "url": "http://secunia.com/advisories/42357" }, { "trust": 1.7, "url": "http://secunia.com/advisories/42397" }, { "trust": 1.7, "url": "http://secunia.com/advisories/42691" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049392.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049523.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-october/049545.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-november/050285.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-november/050390.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-november/050268.html" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:228" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:229" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:230" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2010:231" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:144" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0749.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0750.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0751.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0752.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0753.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0754.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0755.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2010-0859.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1005-1" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "trust": 1.6, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "trust": 1.1, "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3702" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-3702" }, { "trust": 0.8, "url": "http://secunia.com/advisories/41709" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3702" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3704" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638960" }, { "trust": 0.3, "url": "http://blogs.sun.com/security/entry/cve_2010_3702_cve_2010" }, { "trust": 0.3, "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473" }, { "trust": 0.3, "url": "http://www.gnome.org/" }, { "trust": 0.3, "url": "http://www.foolabs.com/xpdf/" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3704" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/" }, { "trust": 0.2, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3703" }, { "trust": 0.1, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026amp;y=2010\u0026amp;m=slackware-security.571720" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3703" }, { "trust": 0.1, "url": "http://secunia.com/advisories/41709/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41709" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2010-0751.html" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/windows_insecure_library_loading/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/41709/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3702" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201402-17.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4035" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3704" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4035" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0-0ubuntu2.3.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5-1ubuntu2.6.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.dsc" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.14.3-0ubuntu1.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4-0ubuntu5.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.10.5.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1-0ubuntu7.8.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.5.1-0ubuntu7.8_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib2_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-qt_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib5_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt2_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.12.0.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.6.4-1ubuntu3.5.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler7_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp-dev_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler_0.5.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-utils_0.12.0-0ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1_0.5.1-0ubuntu7.8_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.10.5-1ubuntu2.6_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-3_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-cpp0_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.10.5-1ubuntu2.6_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler1-glib_0.5.1-0ubuntu7.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler4_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt2_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-dbg_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler2_0.6.4-1ubuntu3.5_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.0-0ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-dev_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.14.3-0ubuntu1.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-2_0.6.4-1ubuntu3.5_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.14.3-0ubuntu1.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib-dev_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/poppler-dbg_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-dev_0.12.0-0ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler5_0.12.4-0ubuntu5.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.10.5-1ubuntu2.6_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/poppler-utils_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-glib4_0.12.4-0ubuntu5.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt-dev_0.12.4-0ubuntu5.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-qt4-dev_0.14.3-0ubuntu1.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/p/poppler/libpoppler-dev_0.6.4-1ubuntu3.5_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt-dev_0.5.1-0ubuntu7.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/p/poppler/libpoppler-qt4-3_0.10.5-1ubuntu2.6_i386.deb" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0764.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1554" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1552.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3702.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0433" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0433.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2642" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1553" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1552" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-2642.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3704.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1554.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-1553.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0764" } ], "sources": [ { "db": "VULHUB", "id": "VHN-46307" }, { "db": "BID", "id": "43841" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "PACKETSTORM", "id": "95788" }, { "db": "PACKETSTORM", "id": "95792" }, { "db": "PACKETSTORM", "id": "94635" }, { "db": "PACKETSTORM", "id": "125234" }, { "db": "PACKETSTORM", "id": "96881" }, { "db": "PACKETSTORM", "id": "94989" }, { "db": "PACKETSTORM", "id": "115842" }, { "db": "CNNVD", "id": "CNNVD-201011-038" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-46307" }, { "db": "BID", "id": "43841" }, { "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "db": "PACKETSTORM", "id": "95788" }, { "db": "PACKETSTORM", "id": "95792" }, { "db": "PACKETSTORM", "id": "94635" }, { "db": "PACKETSTORM", "id": "125234" }, { "db": "PACKETSTORM", "id": "96881" }, { "db": "PACKETSTORM", "id": "94989" }, { "db": "PACKETSTORM", "id": "115842" }, { "db": "CNNVD", "id": "CNNVD-201011-038" }, { "db": "NVD", "id": "CVE-2010-3702" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-11-05T00:00:00", "db": "VULHUB", "id": "VHN-46307" }, { "date": "2010-10-07T00:00:00", "db": "BID", "id": "43841" }, { "date": "2010-12-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "date": "2010-11-12T22:29:38", "db": "PACKETSTORM", "id": "95788" }, { "date": "2010-11-12T22:38:03", "db": "PACKETSTORM", "id": "95792" }, { "date": "2010-10-12T05:59:55", "db": "PACKETSTORM", "id": "94635" }, { "date": "2014-02-18T01:18:49", "db": "PACKETSTORM", "id": "125234" }, { "date": "2010-12-21T18:39:25", "db": "PACKETSTORM", "id": "96881" }, { "date": "2010-10-19T23:48:05", "db": "PACKETSTORM", "id": "94989" }, { "date": "2012-08-24T01:19:13", "db": "PACKETSTORM", "id": "115842" }, { "date": "2010-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-038" }, { "date": "2010-11-05T18:00:05.017000", "db": "NVD", "id": "CVE-2010-3702" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-06T00:00:00", "db": "VULHUB", "id": "VHN-46307" }, { "date": "2015-04-13T21:29:00", "db": "BID", "id": "43841" }, { "date": "2011-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002471" }, { "date": "2020-12-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201011-038" }, { "date": "2024-11-21T01:19:25.627000", "db": "NVD", "id": "CVE-2010-3702" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xpdf and poppler Used in products such as PDF Parser Gfx::getPos Service disruption in functions (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-002471" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201011-038" } ], "trust": 0.6 } }
gsd-2010-3702
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-3702", "description": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "id": "GSD-2010-3702", "references": [ "https://www.suse.com/security/cve/CVE-2010-3702.html", "https://www.debian.org/security/2010/dsa-2135", "https://www.debian.org/security/2010/dsa-2119", "https://access.redhat.com/errata/RHSA-2012:1201", "https://access.redhat.com/errata/RHSA-2010:0859", "https://access.redhat.com/errata/RHSA-2010:0755", "https://access.redhat.com/errata/RHSA-2010:0754", "https://access.redhat.com/errata/RHSA-2010:0753", "https://access.redhat.com/errata/RHSA-2010:0752", "https://access.redhat.com/errata/RHSA-2010:0751", "https://access.redhat.com/errata/RHSA-2010:0750", "https://access.redhat.com/errata/RHSA-2010:0749", "https://linux.oracle.com/cve/CVE-2010-3702.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-3702" ], "details": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.", "id": "GSD-2010-3702", "modified": "2023-12-13T01:21:33.814667Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3702", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "http://www.vupen.com/english/advisories/2011/0230", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0755.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "name": "http://secunia.com/advisories/42397", "refsource": "MISC", "url": "http://secunia.com/advisories/42397" }, { "name": "http://www.vupen.com/english/advisories/2010/3097", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "refsource": "MISC", "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf", "refsource": "MISC", "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1201.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name": "http://secunia.com/advisories/42141", "refsource": "MISC", "url": "http://secunia.com/advisories/42141" }, { "name": "http://secunia.com/advisories/42357", "refsource": "MISC", "url": "http://secunia.com/advisories/42357" }, { "name": "http://secunia.com/advisories/42691", "refsource": "MISC", "url": "http://secunia.com/advisories/42691" }, { "name": "http://secunia.com/advisories/43079", "refsource": "MISC", "url": "http://secunia.com/advisories/43079" }, { "name": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720", "refsource": "MISC", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "name": "http://www.debian.org/security/2010/dsa-2119", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2119" }, { "name": "http://www.debian.org/security/2010/dsa-2135", "refsource": "MISC", "url": "http://www.debian.org/security/2010/dsa-2135" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" }, { "name": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "refsource": "MISC", "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "name": "http://www.openwall.com/lists/oss-security/2010/10/04/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0749.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0750.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0751.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0752.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0753.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0754.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0859.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "name": "http://www.securityfocus.com/bid/43845", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/43845" }, { "name": "http://www.ubuntu.com/usn/USN-1005-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "name": "http://www.vupen.com/english/advisories/2010/2897", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=595245", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.3.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.15.1", "versionStartIncluding": "0.8.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3702" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2010:0749", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0749.html" }, { "name": "USN-1005-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1005-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=595245", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=595245" }, { "name": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf" }, { "name": "FEDORA-2010-15911", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html" }, { "name": "RHSA-2010:0753", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0753.html" }, { "name": "RHSA-2010:0751", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0751.html" }, { "name": "FEDORA-2010-15857", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html" }, { "name": "RHSA-2010:0752", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0752.html" }, { "name": "43845", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/43845" }, { "name": "DSA-2119", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2119" }, { "name": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch" }, { "name": "RHSA-2010:0750", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0750.html" }, { "name": "FEDORA-2010-15981", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html" }, { "name": "[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2010/10/04/6" }, { "name": "ADV-2010-2897", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2897" }, { "name": "FEDORA-2010-16744", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html" }, { "name": "FEDORA-2010-16705", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html" }, { "name": "FEDORA-2010-16662", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html" }, { "name": "42141", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42141" }, { "name": "RHSA-2010:0754", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0754.html" }, { "name": "MDVSA-2010:230", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:230" }, { "name": "SUSE-SR:2010:022", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" }, { "name": "42397", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42397" }, { "name": "MDVSA-2010:229", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:229" }, { "name": "RHSA-2010:0755", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0755.html" }, { "name": "RHSA-2010:0859", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0859.html" }, { "name": "MDVSA-2010:231", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:231" }, { "name": "MDVSA-2010:228", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:228" }, { "name": "42357", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42357" }, { "name": "ADV-2010-3097", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3097" }, { "name": "SSA:2010-324-01", "refsource": "SLACKWARE", "tags": [ "Third Party Advisory" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.571720" }, { "name": "42691", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/42691" }, { "name": "DSA-2135", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-2135" }, { "name": "SUSE-SR:2010:023", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" }, { "name": "SUSE-SR:2010:024", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html" }, { "name": "ADV-2011-0230", "refsource": "VUPEN", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0230" }, { "name": "43079", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43079" }, { "name": "RHSA-2012:1201", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html" }, { "name": "MDVSA-2012:144", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2020-12-23T15:01Z", "publishedDate": "2010-11-05T18:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.